url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://meetabit.com/events/introduction-to-graphql
|
code
|
superlumen, Legiendamm 14, Berlin
19:00 - Meet & greet
19:30 - Intro to Meteor
19:45 - Intro to GraphQL
20:15 - 5m lightning talks, code demos, etc
If you have something to demo, would like to give a lightning talk, are hiring, or otherwise, you're more than welcome to do so. If you'd like to give a full length talk at a future meetup, awesome, shoot us an email and we'll set it up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258621.77/warc/CC-MAIN-20190526025014-20190526051014-00333.warc.gz
|
CC-MAIN-2019-22
| 385 | 6 |
https://www.hotter.com/eu/en/rapid-boot?selectedColour=Plum%20Multi
|
code
|
No Media Setup
Padded ankle support
We need a few more details to add this to your bag:
Increased Energy Return
Our lightweight Hotter Freesole features innovative rebound technology that absorbs the impact of your step and returns it to the next, keeping you moving comfortably for longer.
Our love of all things animal print continues with textured hair leather and suede in feisty leopard and cool reptile finishes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00684.warc.gz
|
CC-MAIN-2022-33
| 418 | 6 |
https://publiclab.org/profile/ephemeralwaves
|
code
|
Share the spectrometer made from the Public Lab spectroscope kit at the Assemble PGH learning pa...
My name is Giselle and I'm based in Pittsburgh. My interests include public science and data collecting with free and open source tools. I've contributed to the thermal photography project on github and have promoted Public Lab projects at Assemble PGH.
View these maps <a href='//mapknitter.org/profile/ephemeralwaves'>at MapKnitter.org »</a>
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806620.63/warc/CC-MAIN-20171122175744-20171122195744-00168.warc.gz
|
CC-MAIN-2017-47
| 444 | 3 |
https://www.diderotsencyclopedie.com/articles/site-mechanics/june-2021-updates-2
|
code
|
I hope that this site has been useful. As of May/June 2021, I have decided to add any source I read about the Encyclopédie, regardless of publishing location, language, date, and format. This does complicate the inventory of sources on this site as it is nearly impossible to measure my progress. However, I am in the middle of a second research project where my readings are not restrcited as they were summer 2020 and I would prefer to just add these sources while I have them fresh in my head. My general timeline is still about one new source a week. That being said, I was busier than expected in the Winter 2021 semester and neglected to stick to that timeline. During this research project and the rest of the summer I am trying to add as many as possible (3 or 4 per week).
Reminder: as of right now, the search service updates every Monday. Thus, sources I add during the week will not be registered in your search until the following Monday around noon EST.
- The search page no longer has a black background (which was hiding the bullet points). Light grey it shall be! Please contact me if this is undesirable.
- The about page was split into sections for easier editing and reading. It includes the update mentioned above.
- The resource page was updated with more scholars, databases, and print sources.
- The banner at the top of each page now remains fixed regardless of scrolling. Now, you do not have to scroll to the top of the page to access it.
Please do not hesitate to reach out to me with any questions, concerns, or comments. I am open to feedback!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00163.warc.gz
|
CC-MAIN-2024-18
| 1,574 | 7 |
https://forums.macrumors.com/threads/coding-macbook-pro-configuration.2196947/
|
code
|
Looking to upgrade my development rig. Software developer during my dayjob and looking to branch into multi-platform development and into a Software Architect role eventually. I code in Visual Studio/.NET Core/VSCode/React/etc. (full stack). But learning Swift and XCode for some macOS/iOS development chops. My requirements: 1) Work great for at least the next 5 years 2) Need to run Windows (I develop win32) and Linux (for containers) simultaneously alongside macOS; planning to do that via Parallels 3) Portability 4) Expandable (as much as possible; e.g. external solutions (eGPU, SSD) are fine) After briefly entertaining an iMac 27incher, I decided portability is a big factor. So I am thinking of the following MBP configuration. Thinking of buying refurbished. Suggestions/feedback for any changes welcome. Originally released May 2019 (i.e. no 2018 models due to throttling) Touch Bar with integrated Touch ID sensor (ugh) 15.4-inch (diagonal) LED-backlit display with IPS technology; 2880-by-1800 native resolution at 220 pixels per inch 32GB of 2400MHz DDR4 onboard memory (for Parallels/VM use) 1TB SSD1 (min. for storing all those VHDs for VMs, and I do a bit of photo/video editing in FCPX) 720p FaceTime HD camera Radeon Pro Vega 20 (this one not sure if I need; could do easily with 560X for my coding needs; but the Vega20 is just $130 more in refurb so ... tempted) + Applecare Going to cost me an arm and a leg , but my last MBP was from mid-2014 (also refurb), with i7 quadcore, 16GB, 512GB SSD, Iris Pro; it was top of the line and cost quite a bit, BUT it has pulled thru 5 years charmingly. It still is my workhorse but a bit slow for heavy duty development tasks. Love the keyboard tho, feels like a downgrade going to the butterfly keyboard. (I might sell it) Also I have a 27" 4k Dell monitor lying around which I figured I could couple with the MBP to create a home workstation rig of sorts later if I like that. Like the option of an eGPU later if I have a need for more powerful GPU for video editing perhaps. No gaming on this box. (well, ok, may be some very light Steam gaming for which the Vega 20 is all good) Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573284.48/warc/CC-MAIN-20190918110932-20190918132932-00278.warc.gz
|
CC-MAIN-2019-39
| 2,152 | 1 |
https://www.seowebdesignllc.com/bing-search-testing-clarifying-questions-in-the-search-results/
|
code
|
Bing Search Testing Clarifying Questions In The Search Results
Dawn Anderson reshared a tweet from Alexander Bondarenko that sat in an information retrieval conference where Microsoft demoed how Bing Search can generate clarifying questions for certain queries in the search results. This photo he posted on Twitter shows a screen shot (not a good quality photo) of this in action.
Here is the photo (click to enlarge):
As you can see, for a search on [blue screen] it asks you what version of windows are you running. For a search on [20th anniversary gifts] it asks you if you are shopping for a husband or wife. For a search on [nsfl] it asks if you if mean not safe for life or northern state…
Search queries are often short, and the underlying user intent may be ambiguous. This makes it challenging for search engines to predict possible intents, only one of which may pertain to the current user. To address this issue, search engines often diversify the result list and present documents relevant to multiple intents of the query. An alternative approach is to ask the user a question to clarify her information need. Asking clarifying questions is particularly important for scenarios with “limited bandwidth” interfaces, such as voice-only and small-screen devices. In addition, our user studies and large-scale online experiment show that asking clarifying questions is also useful in web search. Although some recent studies have pointed out the importance of asking clarifying questions, generating clarifying question for open-domain search tasks remains unstudied and is the focus of this paper. Lack of training data even within major search industry for this task makes it challenging. To mitigate this issue, we first identify a taxonomy of clarification for open-domain search queries by analyzing large-scale query reformulation data sampled from Bing search logs. This taxonomy leads us to a set of question templates and a simple yet effective slot filling algorithm. We further use this model as a source of weak supervision to automatically generate clarifying questions for training. Furthermore, we propose supervised and reinforcement learning models for generating clarifying questions learned from weak supervision data. We also investigate methods for generating candidate answers for each clarifying question, so users can select from a set of pre-defined answers. Human evaluation of the clarifying questions and candidate answers for hundreds of search queries demonstrates the effectiveness of the proposed solutions.
Powered by WPeMatico
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400193391.9/warc/CC-MAIN-20200920031425-20200920061425-00221.warc.gz
|
CC-MAIN-2020-40
| 2,578 | 6 |
http://www.joomlablogger.net/blog/joomla-development/is-your-site-ready-for-joomla-16/
|
code
|
Joomla 1.6 server requirements
The server requirements for Joomla 1.6 is slightly higher than for Joomla 1.5.
Your server should be at least:
- PHP 5.2+
- MySQL 5.0.4+
You can check the version of your current server logging in to the Joomla Administrator and take a look at the System Info screen:
Review your extensions
If you’re planning to move your site to Joomla 1.6, now is a good time to review your extensions. I’ve talked to people who are still on Joomla 1.0 because they can’t get a Joomla 1.5 version of a certain extension.
You should take a look at the extensions you use and see if the developer has plans for a Joomla 1.6 version. Some extensions, like Akeeba Backup, are already ready for Joomla 1.6 (or close to it).
Choosing a Joomla extension is something you should put some thoughts into. Trying to determine the future of an extension is hard, but you could get some hints by reviewing comments on the Joomla Extensions Directory, the developers website and looking at forums or other ways the developer communicates with the users.
In my opinion, the success of Joomla 1.6 largely depends on how fast developers are converting their extensions. They all need to do that to have their extensions take advantage of the new ACL system and other features.
Same thing goes for your template or templates. Templates need to be upgraded for Joomla 1.6 as well. Some template developers, like JoomlArt, have already started to offer Joomla 1.6 ready templates.
Sub templates are another new feature of Joomla 1.6. I think we will se many Joomla template developers taking advantage of that in their commercial template products.
Perhaps the time is right to upgrade your site with a brand new template when moving to Joomla 1.6? Fresh look, fresh start :)
Migration of content
As far as I know, migration of content from Joomla 1.5 to 1.6 should be easy to do. I’ve heard there will be a migration script that convert the database tables and the setup into the Joomla 1.6 way of doing things.
How the migration is going to work exactly is not clear at the moment. I feel this is something which will need to be in place for a Joomla 1.6 implementation to be successful.
Are you ready to learn?
As with all new software versions, you need to learn some new stuff. The main new thing in Joomla 1.6 is ACL, the permissions system. The ACL (Access Control List) system is quite complex, so you need to spend some time to understand it. When setting up a site, it will be important to set up the ACL correctly and with a thought through process.
I would recommend you download and install the latest beta version of Joomla 1.6 beta, and play around with it. That’s the best way to learn about it. Just don’t install it on a live site yet.
If you want more information on the new features of Joomla 1.6, see my Joomla 1.6 Infographic.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702900179/warc/CC-MAIN-20130516111500-00040-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,857 | 21 |
https://community.intel.com/t5/Server-Products/Server-board-S2600CP2-1-5-1-2-beep-code/td-p/391308
|
code
|
I just bought brand new Intel server board S2600CP2, installed with 128 (16*8G DDR4-1600) RAM, 2 X E5-2620 processor, attached all power cable (server board, 2 CPUs), with 1000W PSU, but when I try to first time power on the server, i receive 1-5-1-2 beep code, the system can't start, nothing showing on screen (actually no signal output).
I checked manual, 1-5-1-2 beep code means: VR Watchdog Timer sensor assertion.
Anyone has any idea?
Maybe I should go MicroCenter exchange one but they only has one left.
This means the BMC did not get a SystemPowerGood signal, in the 500ms timeout period. If disconnecting and reseating the power supply connectors does not solve the issue, make sure the chassis power supply is pinned out correctly and providing sufficient amperage.
http://www.intel.com/support/motherboards/server/s2600cp/sb/CS-033291.htm Intel� Server Board S2600CP Family — Chassis Compatibility
http://www.intel.com/support/motherboards/server/s2600cp/sb/CS-033128.htm Intel� Server Board S2600CP Family — Technical Product Specification
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00452.warc.gz
|
CC-MAIN-2023-40
| 1,060 | 7 |
https://www.dvorakgaming.com/warcraft/raid-guides/clsc/zulgurub/healer/high-priest-venoxis/
|
code
|
This page covers a healer-focused strategy for High Priest Venoxis in Zul'Gurub. While it's tailored for healers, other roles may also find the information useful. If you have any suggestions or feedback, you can leave a comment below or tweet @PrestonDvorak.
This guide has been updated and maintained based on my own experiences with the encounter, logs information, and Dungeon Journal information. I'll continue to update it as-needed.
General Mechanics and Abilities
Stage One - The Priest
This stage begins the encounter and ends when Venoxis reaches 50% health.
- Accompanied by four Razzashi Cobras.
- Razzashi Cobra
- Susceptible to crowd control.
- Target random players with Poison (dispel, poison), dealing light damage over time.
- Razzashi Cobra
- Interrupt or dispel Holy Fire (dispel, magic).
- Stay 15-yards away to avoid Holy Nova and [Holy Wrath]*.
- *My memory of this spell is sparse and comments and old guides seem to suggest different methods of dealing with it, such as draining Venoxis' mana, having melee stay out completely, or just splitting your raid into a melee and ranged group (which is what I remember doing). I'll update this when I find more concrete information.
- Purge Renew to prevent the healing over time.
Stage Two - The Serpent
This stage begins when Venoxis reaches 50% health and ends when he's killed.
- Venoxis transforms into a serpent and will no longer use any abilities from stage one.
- Avoid the Poison Clouds (dispel, poison) left at Venoxis' location.
- The current tank will likely always be hit by this as they move Venoxis out of the cloud.
- Tanks should have as much Nature Resistance as possible without sacrificing other stats.
- Melee and Ranged/Healers generally won't make use of any additional Resistances on this encounter.
The notes below mostly pertain to progression difficulty, meaning if you out-gear the difficulty you're on or use extra healers they may not apply.
- Be aware of any dispelling that needs to be done as it can get out of control quickly.
- The most damage will likely be from [Holy Wrath] hitting melee players, so be sure to keep them near full health.
Debuffs to Track
- Major: Holy Fire (dispel, magic), Poison Cloud (dispel, poison)
- Minor: Poison (dispel, poison)
- Buffs to Purge: Renew
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506959.34/warc/CC-MAIN-20200402111815-20200402141815-00060.warc.gz
|
CC-MAIN-2020-16
| 2,285 | 28 |
http://freesoftwaremagazine.com/articles/kindness_strangers_can_defeat_proprietary_cloud_computing_free_software_solutions/
|
code
|
Fashion is fickle. One day thin clients and clusters are the fashion de jour, the next it's Web 2.0, Virtualisation or distributed computing and Grids. They who live by the sword of fashion will surely perish by it but a new model has been strutting its stuff along the catwalk of web fashion and she goes by the name of Cloud Computing. Like all fashions there is a deal of hype surrounding it but there is a consistent concern emerging from all that hype and is about the dangers of proprietary cloud computing. Richard Stallman has called it a "trap". He is right--but it is more than that. It is a well-baited, DRM-like honey trap for the unwary. That is not immediately obvious. Like all good traps it suckers you in before the wire noose tightens around your neck. You don't have any wire cutters in your rucksack but you do have the GPL and free software to effect an escape. Can it save us from vendor lock in and proprietary software?
What's wrong with proprietary clouds
when presented with the shiny baubles of cloud computing users can take a rush of blood to the head
The hobbled nature of proprietary software is too well known to need detailed reprising here: cost, interoperability, restrictions on use, licences etc. Yet, when presented with the shiny baubles of cloud computing users can take a rush of blood to the head like lovers in the first flush of romance. They see a useful product, they want it and they are in too much of a hurry to read the small print. Well, we've all done it but that's no excuse. Usually, you read the small print after the website hosting you valuable data has folded, hiked up the costs or you discover it has allowed data mining and search engines indexing the site.
Here is a quick thumbnail list of what is wrong with proprietary clouds:
- inability to control costs--fees, subscriptions
- no control over choice of hardware specifications
- no control over connection protocols
- no right to change applications or access source code--or write new ones
- problems encrypting your own data (except during transmission)
- some cloud hosts are free, as in beer but not speech
- inability to control the economic business model determining a host's viability
- you can't host the cloud where you want it
- unable to scale hardware and software configurations
Oranges aren't the only fruit
I'm sure you can add many more to that list but you get the picture. At a time when the cost of storage on removable media is sinfully cheap, with even external Terabyte drives (1024 Gigabytes) being eminently affordable, you are probably asking why you would want to go to the bother and possible expense of hosting your data remotely with all these catches. Well, as far as just backing up music, videos, configuration files and indeed whole hard drives, it really is better for the average user to do it all locally. For them cloud computing is probably unnecessary and arguments against it are moot. Being local not only avoids Stallman's trap, it also frees you from the vagaries of network connections too. Nevertheless, there will be times when cloud computing could be useful and just because many clouds are proprietary doesn't mean we're out of luck. Well, oranges aren't the only fruit.
If you are working on a project, software or otherwise, collaboration is in order and many people set up wikis and mediawikis but you may need to scale up for big projects like software development or writing books. This is where open source cloud computing offers a solution that guarantees security and total ownership to the last nut and bolt. Cloud computing is not a threat to free software--unless you knowingly embrace the proprietary model. The FOSS model ensures that you can avoid that Faustian pact.
our freedoms will depend on the kindness of strangers donating their modifications to our code back to us
Others have understood this and launched an open cloud manifesto. This can be seen as a response perhaps to Tim O'Reilly's belief that we need a set of guidelines for open services to avoid open source licences becoming obsolete and to others GNU/Linux luminaries like Jeremy Allison (of SAMBA fame and principled opposition to the MS/Novell patent deal) who described the gap, now filled by AGPL, as the GPL's fatal flaw:
If I ever work on cloud computing code, I'd like to see it under the AGPL, in order to preserve the freedoms I've been able to enjoy in conventional software development these many years. Without the AGPL, our freedoms will depend on the kindness of strangers donating their modifications to our code back to us, as they did in the days before the GPL license and the FSF was born.
Some believe that the flaw would facilitate the use of GPL code in exactly the same way tha BSD code is used in proprietary software.
The manifesto does not seem to be aimed primarily at the individual but the manifesto principles scale equally well for a group of non-commercial collaborators in the free software community. However, this manifesto is not some kind of technical standard like ISO; so, free software cloud computing needs a little more robust protection and it has it in the form of the AGPL--the Affero General Public Licence, version 3.0. The AGPL has specific provisions relating to the use of software over a computer network (Section 13 of the licence refers).
It is GPL compatible and permits linking to GPLv3'd works in the sense that you are permitted to combine separate modules or source files released under the GPL and the AGPL in a single project. Importantly, the AGPL is a strong copyleft licence which means that derived works must retain the terms of the licence and that you must make the source code available too (useful if you want to check code to make sure no one has smuggled in a trojan horse or rootkit virus). That should ensure that free software clouds will not be hijacked by maraudering, proprietary hostile take over merchants. The licence has been reported as being used by more than one hundred projects.
Keep your cloud local
Surely that's a contradiction in terms? Let's see. Even if you ensure that the cloud computing you use is full of GPL'd goodness, uploading data to third-party servers just plain unnerves some folk. They prefer something akin to the peer-to-peer file sharing model where, once the necessary (free) software has been installed, users can share/exchange files. Of course, free software cloud computing requires more sophisticated tools than file sharing but both models cut out the middle man.
Your home computer effectively becomes a storage server. Yes, you can enjoy cloud computing from the comfort of your laptop or desktop and if you project collaborators have installed the software too you now have the same facilities as the captives helots to the proprietary clouds infesting hired domains and servers on the internet. The only downside is the need for home machines which are not net-facing servers to be always on.
So who and where exactly are these free software clouds?
Outsourcing your digital rights to third parties is like advocating big government, you barter away your rights and freedoms in a chaotic, uncertain world for the drab and penal certainties of life under the shelter and protection of Big Brother
Richard Stallman said that cloud computing was a trap, not just because the software running the cloud may be proprietary but for all the other obvious reasons about safety, access, security, interoperability and ownership but simply because the very act of "hosting" anything on a third-party server makes users hostage to fortune. Outsourcing your digital rights to third parties is like advocating big government, you barter your rights and freedoms in a chaotic, uncertain world for the drab and penal certainties of life under the shelter and protection of Big Brother. You may never want for anything--except the freedom that makes you fully human and life worth living.
Even if cloud computing is all hype, mostly hype, a passing fad or a fast forward button away from the past of thin clients, the free software community cannot afford not to get in on the ground floor (if you'll excuse the double negative). If it really becomes a new paradigm shift it needs to get to the dining table before the feast is scoffed by the corporate raiders of commercial, proprietary software. Don't believe me? Well, Dell actually tried to trademark the term "cloud computing". Thankfully the application was refused but it does give you some idea of the sheer effrontery of hardware vendors.
Even Microsoft might have blushed at that and they realise that as people are increasingly reluctant to lock themselves into expensive software/hardware upgrades (especially in the current economic climate), they have to survive by renting software and selling it as a service (SAAS)--and calling it cloud computing. Microsoft has LiveMesh and Apple has Mobile Me. Both are of course proprietary. The only true protection from all of this is dedicated free software and it's starting to appear out there.
If you want to own the hardware and the software and choose who gets to access it all Tonido may be one solution. It has all the usual features you would expect of cloud computing (for God's sake, when are we going to invent a better term than that? Every time I hear it, say it or write it I see think of Aristophanes' The Clouds.)
With Tonido your computer is the storage server and it also hosts the applications. It is probably better and more accurate to call applications like this "Personal Cloud Computing". Some have even called it "cloudless private file sharing". Cloudless cloud computing, Who knew? Tonido describes itself as an extensible personal web application development and the developers don't like the buzz term cloud computing at all. The main function of Tonido is for it's servers to track your IP for remote logins. Tonido has modules for things like music, blogs, photos, calendars and file sharing and more importantly, a built-in P2P service that facilitates file sharing in collaborative projects. As I said earlier, the only downside is that you will need to leave your computer on. Even so, Tonido looks like a solution for user who fall into the SOHO (small office, home) category. There is a problem though.
The Tonido platform is free software--but the applications shipped with it are not. Developers are free to add their own free applications and release them under a pure, undiluted open source licence if they so wish. The platform is available under a number of licences, including the GPLv3. Currently Tonido is availabe for Ubuntu 8.04 (Ubuntu, Kubuntu Xubuntu). A Firefox plugin Tonidofox has just been released which allows to access many Tonido features directly from that browser. It is downloadable from their site and is, I suspect, proprietary too.
In GroundOS, OS stands for open source, not operating system. GroundOS is not available yet. It is due for launch on 1st May this year. It is for individuals, groups and organisations which means that it is highly scalable. It can be set up at home for personal private use, on a web server or in collaboration with friends or project workers.
The developers describe it as fully free and open source. It has been released under an MIT/BSD licence. Examples of software using the MIT licence are Fluxbox, QTorrent, Banshee and Ruby on Rails. If you visit and read the front page of the website it is clear that the developers are committed to plucking cloud computing from the clutches of commerce and their detailed explication of it shows real commitment to the philosophy and practice--but I would have been happier if they had released their software under the banner of an unalloyed GPLv3 licence.
Many people who want to use it might be thwarted by their lack of knowledge and experience in setting up a web server if they have no experience of PHP5, Apache and MySQL but the developers have catered for that by their intention to release a simpler setup program (presumably a point and click wizard) to install it for you. They are going to cater for end users and webmasters, the latter being highly configurable with drag and drop and easily installable scripts to create applications from IDE, FTP, mail, blogs, forums etc. It's very early days but if you want to avoid vendor lockin and proprietary software, GroundOS, if it lives up to the pre-publicity, could be your get-out-of-jail free card that escapes the Stallman trap and the marketing hype invented to disguise the ugly truth about SAAS and rented software.
Ubuntu: hey you, get on our cloud
Koalas are cute and cuddly and they like Eucalyptus leaves. They're not the only ones. Ubuntu do too. Ubuntu 9.10 (Jaunty Jacklope) has just been released and it comes with Eucalpytus (Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems. Phew!) designed for cloud computing on clusters on local networks with protection from an external firewall and compatibility with Amazon's EC2 Service. I'll let Mark Shuttleworth say it better than I can (in his usual metaphorical style):
A good Koala knows how to see the wood for the trees, even when her head is in the clouds. Ubuntu aims to keep free software at the forefront of cloud computing by embracing the API’s of Amazon EC2, and making it easy for anybody to setup their own cloud using entirely open tools. We’re currently in beta with official Ubuntu base AMI’s for use on Amazon EC2. During the Karmic cycle we want to make it easy to deploy applications into the cloud, with ready-to-run appliances or by quickly assembling a custom image. Ubuntu-vmbuilder makes it easy to create a custom AMI today, but a portfolio of standard image profiles will allow easier collaboration between people doing similar things on EC2. Wouldn’t it be apt for Ubuntu to make the Amazon jungle as easy to navigate as, say, APT? What if you want to build an EC2-style cloud of your own? Of all the trees in the wood, a Koala’s favorite leaf is Eucalyptus. The Eucalyptus project, from UCSB, enables you to create an EC2-style cloud in your own data center, on your own hardware. It’s no coincidence that Eucalyptus has just been uploaded to universe and will be part of Jaunty - during the Karmic cycle we expect to make those clouds dance, with dynamically growing and shrinking resource allocations depending on your needs. A savvy Koala knows that the best way to conserve energy is to go to sleep, and these days even servers can suspend and resume, so imagine if we could make it possible to build a cloud computing facility that drops its energy use virtually to zero by napping in the midday heat, and waking up when there’s work to be done. No need to drink at the energy fountain when there’s nothing going on. If we get all of this right, our Koala will help take the edge off the bear market.
Not quite in the same territory as Tonido or GroundOS I'll admit but it shows that Ubuntu can see where things may be going and as it is free and open we will doubtless see distros which traditionally fork from Ubuntu deploying it too and taking it in directions for which it was never originally envisaged. That's the GNU/Linux way.
like yesterday's newspaper, cloud computing may become tomorrow's fish and chip wrapper
If the spirit and philosophy behind software like Tonido and GroundOS, particularly GroundOS, are anything to go by then it might be that for once free software is on the crest of a curve, or even ahead, instead of lagging behind it. I will not ever be trusting personal, stand alone data and backups on anything other than my own removable media but for collaborative projects free software "clouds" would be an acceptable solution.
Maybe it is all just hype and like yesterday's newspaper it will become tomorrow's fish and chip wrapper, but if so-called free software cloud computing is the real deal then you might want to give it the benefit of doubt. Think of it like a technical version of Pascal's wager. Nothing to lose and everything to gain. Let me put it this way: I'm making a note in my desk diary for 1st May. It could be the start of something beautiful.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00620.warc.gz
|
CC-MAIN-2023-40
| 16,199 | 44 |
https://digilent.com/blog/how-to-program-your-fpga-there-are-four-ways/
|
code
|
If you are beginning to get into the world of FPGAs, one of the first things you need to know is how to program your board (starting with the Basys 3 is a fine idea). That includes how to get the bit file loaded, to configuring the hardware on the board. When I was first learning, I was only taught how to program the board via JTAG.
This configures the hardware, but does not load the bit file into memory, meaning that if the board is power-cycled for any reason the program is lost. Now it can be reprogrammed, but that can be time consuming. And if you need to demonstrate to a class or if you want to send your board with the code loaded to something like a Tradeshow you need the code to stay even when the board is powered off!
Well in case you didn’t know, there are 4 ways to program your FPGA board. They include JTAG, Quad SPI Flash, USB and Micro SD. All four are described in handy programming guides on each FPGA’s respective resource center. Note that not all FPGAs can be programmed by all four methods. This blog post will address how to get started when programming some of Digilents most popular FPGAs!
The first method involves programming the volatile memory on the board via JTAG. To program via JTAG:
- Make sure the programming jumper is in the JTAG position.
- Click program device, select the device, and select the correct bit file
- Click program
The second method is to load the bit file onto the non-volatile quad SPI flash memory on board.
- Make sure the programming jumper is in the QSPI position
- In the Hardware Manager click on the device, and add configuration memory device
- Select the memory device on your board
- Select the bit file and click Okay
- This file will now load during start up
The third is via USB memory stick or Micro SD Card.
- Make sure the programming jumper is in the USB/SD position and the media select jumper position is in either the USB or SD position depending on what you want to use
- Plug the USB drive or Micro SD Card into your computer
- Copy the bit file into the root of the USB device or Micro SD Card
- Plug the USB device or Micro SD Card into your board
- Power and turn onto the board
Whats your favorite programming method for FPGA?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510368.33/warc/CC-MAIN-20230928063033-20230928093033-00864.warc.gz
|
CC-MAIN-2023-40
| 2,219 | 20 |
https://readforlearn.com/what-is-newline-character-n/
|
code
|
sed man page:
Normally, sed cyclically copies a line of input, not including its terminating newline character, into a pattern space, (unless there is something left after a “D” function), applies all of the commands with addresses that select that pattern space, copies the pattern space to the standard output, appending a newline, and deletes the pattern space.
It’s operating on the line without the newline present, so the pattern you have there can’t ever match. You need to do something else – like match against
$ (end-of-line) or
Here’s an example of something that worked for me:
$ cat > states California Massachusetts Arizona $ sed -e 's/$/\ > /' states California Massachusetts Arizona
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522309.14/warc/CC-MAIN-20220518183254-20220518213254-00051.warc.gz
|
CC-MAIN-2022-21
| 710 | 6 |
https://github.com/ericmmartin/simplemodal/pull/4
|
code
|
HTTPS clone URL
Subversion checkout URL
Change container height to match content height on update #4
dvassilenko wants to merge 2 commits into ericmmartin:master from dvassilenko:master
dvassilenko added some commits
Commits on Sep 22, 2011
…height of the data inside it
This page is out of date. Refresh to see the latest.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738004493.88/warc/CC-MAIN-20151001222004-00195-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 325 | 8 |
http://stackoverflow.com/questions/12354785/oracle-update-statement-using-the-replace-function
|
code
|
I am trying to remember how form a proper
REPLACE statement in Oracle SQL.
In essence, I need to perform a
REPLACE over a few thousand records in which
column2 may contain a value of
'14'. If they do, I need to replace it with just a space character.
I know that the syntax is something like the following, but I can't seem to get it quite right:
UPDATE TABLE SET ('column1', 'column2') = REPLACE(?????????????) WHERE 'column1' IN ('14') AND 'column2' NOT LIKE ('4%')
Any help would be appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678694248/warc/CC-MAIN-20140313024454-00072-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 498 | 9 |
https://discuss.rubyonrails.org/t/how-do-i-upgrade-rack-in-my-current-rails-app/52316
|
code
|
Sam Kong wrote:
I have a rails 2.3.8 app which has rack 1.1.0.
I get parse_multipart error.
There's a new release of rack 1.2.0 which might fix the multipart error.
The question is how I upgrade the rack?
I froze the rails.
I did "gem update rack" and it upgraded rack to 1.2.0.
But my rails app still uses rack 1.1.
How do I set the rails app use rack 1.2.0?
Sorry, I don't know exactly how to resolve your issue, but I can tell
you this much. Rails version 2.3.5 used a version of Rack prior to 1.1.0
(I don't remember the exact version). Rails used that version even when
a newer Rack gem was installed. Apparently its dependency is restricted
it to use the older version only.
Maybe Rails 2.3.8 is doing something similar for Rack 1.1.0.
What indication do you have that upgrading to Rack 1.2.0 will solve your
problem? Did you read that somewhere, or are you just guessing? If the
latter then you're probably wasting your time. If Rails 2.3.8 were
having issues with the version of Rack installed, then it seems likely
that a lot of people would be having the same problem.
I've not actually been able to try Rails 2.3.8, because I can't install
it on one of my machines for some reason. I haven't figured out why.
And, with Rails 3.0 so close to release I may skip 2.3.8 altogether. It
seems like it still has some issues anyway.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657145436.64/warc/CC-MAIN-20200713131310-20200713161310-00542.warc.gz
|
CC-MAIN-2020-29
| 1,335 | 24 |
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-7/ff817622(v=ws.10)?redirectedfrom=MSDN
|
code
|
Windows 7 Service Pack 1
Applies To: Windows 7, Windows 7 with SP1
The following articles are specific to Windows 7 with Service Pack 1 (SP1). You can use this information to evaluate and deploy Windows 7 with SP1.
To download the stand-alone Service Pack 1 for Windows 7, go to Service Pack 1 for Windows Server 2008 R2 and Windows 7.
Release notes address critical late-breaking issues and information related to Windows 7 with SP1. Currently, no critical issues that require you to take corrective action either before or immediately after installation have been reported or discovered in testing. The document is continuously updated, so if any such issues are discovered or reported, they will be available in the Release Notes document.
This Excel spreadsheet tabulates all of the hotfixes and security updates that are installed as part of this service pack.
This document describes some of the notable changes introduced in this release of Windows 7 with SP1 and Windows Server 2008 R2 with SP1.
This guide, which describes deploying Windows Server 2008 R2 with SP1, also describes deploying Windows 7 with SP1 in a business or corporate environment.
If you’re having issues with your installation of SP1 for Windows 7, see the following KB articles:
The following documentation describes features and functionality available in Service Pack 1 for Windows 7 and Windows Server 2008 R2.
What’s New: Microsoft RemoteFX
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00549.warc.gz
|
CC-MAIN-2023-40
| 1,428 | 11 |
http://community.i-do.com.au/topic/149124-good-beef-casserolestew-recipes/
|
code
|
Good beef casserole/stew recipes?
Posted 06 July 2011 - 08:11 PM
Whenever I try doing a stew in the slow cooker I seem to mess up on the amount of liquid. Can anyone give me a quick recipe using any or all of the ingredients?
Posted 06 July 2011 - 08:33 PM
Posted 06 July 2011 - 08:57 PM
I put meat and veg in without liquid (or just some tomato paste) and let the natural juices come out. I then mix in some gluten free gravy powder towards the end. Works well
Like a pot roast? Excellent! Thanks. How long do you do it for?
Posted 06 July 2011 - 09:21 PM
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739046.14/warc/CC-MAIN-20200813132415-20200813162415-00531.warc.gz
|
CC-MAIN-2020-34
| 628 | 10 |
https://unix.stackexchange.com/questions/450495/mdadm-adding-a-disk-to-raid5-with-slightly-less-sectors
|
code
|
You will have to reduce the size of whatever is stored on the
md0 array first. Unfortunately you give very little information on that.
- If there is a plain filesystem directly on
/dev/md0 then it depends on the filesystem type how you can reduce its size, if at all possible.
- If there is an LVM physical array on
/dev/md0 then you first have to reduce the size of that, which in turn may mean you here also have to reduce a filesystem, then reduce the logical volume, then reduce the volume group, then the physical volume.
As you're trying to add disks to a RAID5 consisting of (slightly larger) 2TB disks, it might be easiest to first assemble a RAID5 with the 2 new disks, pass
missing as the name of the third disk which will create a RAID5 with one disk missing. Now copy the data over from the old RAID5 to the new RAID5. Disconnect the old RAID5 disks and verify all your data is available on the new RAID5. Now you can reconnect the old RAID5 disks, use
mdadm --zero-superblock on the old component disks (perhaps you might need to do
mdadm --stop /dev/md0 first), this wipes any information about the old RAID5. Now you can add the disks to the new RAID5.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999787.0/warc/CC-MAIN-20190625031825-20190625053825-00156.warc.gz
|
CC-MAIN-2019-26
| 1,167 | 10 |
http://fizzleandpop.blogspot.com/2005/08/pardon-language.html
|
code
|
You know. The "F" word. As in "Fucking Hell! I just found out from the home site's message board that fucking Showtime canceled 'Dead Like Me'! Fuckers!" etc.
Sorry about that, but this really, really pisses me off. No, I never watched it on Showtime, but for what it's worth I rarely watch any TV series while it's airing. I get what I like on DVD*. Heather gave me the first season of DLM as a birthday present and I bought the second season a couple weeks ago as soon as I saw it on the shelf.
So now 'Dead Like Me' joins 'Freaks & Geeks' and 'Miracles' as another show that I loved that is now over unless someone with the power pulls their head out of their butt and revives it before the actors move on. I can't even determine if they filmed a third season or not. It looks like they might have done half of it.
Something of substance from me still to come. I just wanted to share my annoyance.
* Let's see, off the top of my head: King of the Hill, The Simpsons, Futurama, Family Guy, Dilbert, Aqua Teen Hunger Force, Invader Zim, Ren & Stimpy Show, Harvy Birdman, Sealab 2021, Beavis & Butthead, South Park, Rex the Runt, CSI, Columbo, MST3K, Monk, Twilight Zone, Ultraviolet, Freaks & Geeks, The Avengers, Highlander, X-Files, Danger 50,000 Volts!, Only Fools & Horses, Monty Python's Flying Circus, Kids in the Hall, The Thin Blue Line, The Young Ones, Bottom, The Office, Secret Agent, Oz, Black Adder, Red Dwarf, Father Ted, League of Gentlemen, Mr. Show, Reno 911, Chappelle's Show, Three's Company, That 70's Show, Quantum Leap, Malcolm in the Middle, Married With Children, Soap, Strangers With Candy, The Prisoner, Band of Brothers... I know there are more that I'm forgetting. I like TV, I just like it better on my schedule (I know, I need tivo). Yes, a lot of the shows I have are finished or cancelled, but a lot of them were also given an ending when their time was done. It sucks having something end without a resolution, especially after only one or two seasons.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887077.23/warc/CC-MAIN-20180118071706-20180118091706-00546.warc.gz
|
CC-MAIN-2018-05
| 1,986 | 5 |
https://github.com/kubernetes/kubernetes/pull/66367
|
code
|
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
getPids - don't recursively traverse every dir in /proc #66367
What this PR does / why we need it:
changed the title from
PidOf - don't recursively traverse every dir
getPids - don't recursively traverse every dir
Jul 19, 2018
@lanchongyizu: Cannot trigger testing until a trusted user reviews the PR and leaves an
Issues go stale after 90d of inactivity.
If this issue is safe to close now please do so with
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
Would it be simpler to make a more surgical change? Something like:
[APPROVALNOTIFIER] This PR is APPROVED
The full list of commands accepted by this bot can be found here.
The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741151.56/warc/CC-MAIN-20181112215517-20181113001517-00243.warc.gz
|
CC-MAIN-2018-47
| 953 | 18 |
https://opiatalk.com/what-does-the-expression-spanish-inquisition-mean/
|
code
|
What does the expression Spanish Inquisition mean?
Filters. (figuratively) Excessive questioning or interrogation.
What happened during the Spanish Inquisition?
The Inquisition was a powerful office set up within the Catholic Church to root out and punish heresy throughout Europe and the Americas. Beginning in the 12th century and continuing for hundreds of years, the Inquisition is infamous for the severity of its tortures and its persecution of Jews and Muslims.
What was the main goal of the Spanish Inquisition?
The Spanish Inquisition was a judicial institution that lasted between 1478 and 1834. Its ostensible purpose was to combat heresy in Spain, but, in practice, it resulted in consolidating power in the monarchy of the newly unified Spanish kingdom. Its brutal methods led to widespread death and suffering.
What was the goal of the Spanish Inquisition quizlet?
What was the Spanish Inquisition? To purify Spain by getting rid of everyone who didn’t believe like them.
Where did the Spanish Inquisition meme come from?
One of the most infamous representations of inquisitors involves torture by pillow, bad introductions, and the famous line, “Nobody expects the Spanish Inquisition!” It comes from the comedy group Monty Python and their sketch comedy show, Flying Circus.
How many were killed in Spanish Inquisition?
Estimates of the number killed by the Spanish Inquisition, which Sixtus IV authorised in a papal bull in 1478, have ranged from 30,000 to 300,000. Some historians are convinced that millions died.
Who stopped the Spanish Inquisition?
The Spanish queen regent María Cristina de Borbón issued a decree abolishing the Spanish Inquisition on July 15, 1834.
How many died from the Spanish Inquisition?
The Spanish Inquisition was the most deadly during its first decades. It is estimated that, up to 1530, as many as 2,000 people died at the hands of the Inquisition; in the 350 years of the Spanish Inquisition, approximately double that number are thought to have been killed.
What best describes the outcome of the Spanish Inquisition?
What best describes the outcome of the Spanish Inquisition? Christian armies defeated Muslims and took control of Spain.
How was punishing heretics supposed to stop the spread of Protestantism?
Explanation: The first effort to stop the spread of protestantism was to declare the effort to reform the Catholic Church a heresy. People who supported the protests of the sale of indulgences and other practice perceived by the protesters as unbiblical were excommunicated.
Why is the Spanish Inquisition so important?
Spanish Inquisition, (1478-1834), judicial institution ostensibly established to combat heresy in Spain . In practice, the Spanish Inquisition served to consolidate power in the monarchy of the newly unified Spanish kingdom, but it achieved that end through infamously brutal methods.
What does Spanish Inquisition mean?
Spanish Inquisition. (Historical Terms) the institution that guarded the orthodoxy of Catholicism in Spain, chiefly by the persecution of Jews and Muslims, esp from the 15th to 17th centuries.
How did the Inquisition operate in Spain?
The grand inquisitor acted as the head of the Inquisition in Spain. The ecclesiastical jurisdiction that he had received from the Vatican empowered him to name deputies and hear appeals. In deciding appeals, the grand inquisitor was assisted by a council of five members and by consultors.
What are the dates of the Spanish Inquisition?
Spanish Inquisition. noun. the Inquisition in Spain, under state control from 1480 to 1834, marked by the extreme severity and cruelty of its proceedings in the 16th century.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00423.warc.gz
|
CC-MAIN-2023-23
| 3,659 | 28 |
https://www.cubicweb.org/ticket/3814292
|
code
|
cubicweb-collaboration #3814292 only handle entity types and rdefs strictly in the container in security setup [validation pending]
The permissions rules (e.g. based on can_write relation) just assumes that entities are always linked a container, despite the application schema may not enforce it.
|closed by||#d0c07957b90f Do not set permissions on entity types which instance can live outside the container|
|patch||Do not set permissions on entity types which instance can live outside the container [applied]Do not set permissions on relation definitions for which the parent entity can live outside the container [folded]Relax permissions for relations between entities not in a container [rejected]Relax permissions for entities not in their container [rejected]|
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249595829.93/warc/CC-MAIN-20190224044113-20190224070113-00136.warc.gz
|
CC-MAIN-2019-09
| 769 | 4 |
https://gizmodo.com/how-to-chart-your-every-procrastination-5525701
|
code
|
Sure, the Sidetrack table turns your home into a near-police state, with monitors in every room. But how else are you going to get an exact chart of your ADD wanderings? It's also... woooooaaah SHINY!
Sorry. Distracted there for a minute. Where was I? Oh, right, Sidetrack. It's a project from students at the Copenhagen Institute of Interaction Design, and frankly all I can see myself doing is generating sophomoric sketches by taking circuitous, dong-shaped laps around my apartment. Which, hey, still fun! [Core77]
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141715252.96/warc/CC-MAIN-20201202175113-20201202205113-00115.warc.gz
|
CC-MAIN-2020-50
| 518 | 2 |
https://mariadb.com/docs/skysql-dbaas/connect/power-bi/
|
code
|
MariaDB Direct Query Adapter For Microsoft Power BI
MariaDB Direct Query Adapter for Power BI enables Microsoft Power BI Desktop users to remotely connect to and query their MariaDB database including on MariaDB SkySQL without downloading the entire data set to their local machine.
MariaDB Direct Query Adapter is a Microsoft certified connector for Microsoft Power BI Desktop.
Microsoft Power BI Desktop is a free business intelligence tool available as a downloadable desktop client. Built for analysts, Microsoft Power BI provides state-of-the-art interactive visualizations, with industry-leading data query and modeling built-in. It is one of the top business intelligence tools in use globally.
MariaDB database products support analytics and data warehousing in addition to transactional databases. Customers can meet the challenges from complex workloads using a single stack. MariaDB Enterprise Server includes pluggable smart storage engines to meet specific workload needs and connectors for high-performance data access by applications.
MariaDB Enterprise ColumnStoreMariaDB Enterprise ColumnStore is a columnar storage engine designed to handle the extremely large data sets and ad hoc queries of analytical workloads. Data is written to disk by column rather than row and is automatically partitioned. Columnar data storage is designed to deliver real time analysis on billions of rows. MariaDB Enterprise ColumnStoreMariaDB Enterprise ColumnStore is a plugin storage engine and is included with MariaDB Enterprise Server.
MariaDB Direct Query Adapter enables Power BI users to work with remote data without the need to download it onto the local machine. Downloading analytical data sets can present challenges such as download speed and inadequate memory on a local machine, and even a powerful laptop or desktop will be outperformed by the processing power of a high end server or MPP system. MariaDB's Direct Query Adapter enables users to avoid these limitations and provides robust querying and data visualization from any location.
MariaDB Direct Query Adapter for Microsoft Power BI requires:
Download and Install
To use MariaDB Direct Query Adapter with Microsoft Power BI Desktop:
Download Microsoft Power BI Desktop using the Microsoft instructions.
Download MariaDB ODBC Connector.
Select MariaDB ODBC Connector v3.1.10 or later for MS Windows 64-bit.
Click on the download or choose "Open" to start the MariaDB ODBC Connector 64-bit Setup Wizard.
Read and accept the terms and agreement.
Choose "Typical" for installation type and click "Install".
When asked if you want to allow this app to makes changes to your device, click "Yes".
If you have older versions of MariaDB ODBC Connector 64-bit, select "Make User DSN's for older Connector version to use this version" and click "Finish". Otherwise, just click "Finish".
Connect to your remote MariaDB database from Power BI Desktop using the MariaDB Direct Query Adapter.
Open Microsoft Power BI Desktop.
From the Power BI home screen, choose Get Data->More. Enter "MariaDB". Select MariaDB from the menu and click "Connect".
Enter the data source. This will be an IP address and port number, or in the case of SkySQL, it will be the qualified domain name and port number.
Select "DirectQuery" and click "OK".
Enter your user name and password and click "Connect".
You are now connected to your remote MariaDB database and can use Microsoft Power BI to run queries without the need to download the data locally.
The MariaDB Direct Query Adapter for Power BI interacts with the SQL layer. It is upstream of the storage engine, so queries can be done regardless of the underlying storage engine.
For example, MariaDB Direct Query Adapter for Microsoft Power BI can be used to query data on a row-based transactional database using the InnoDB storage engines or a column-based data warehouse using the MariaDB Enterprise ColumnStore storage engine to deliver real time analysis of billions of rows of data.
Power BI depends on relationships for data analysis. These relationships are automatically established for row-based databases, for example those using the InnoDB storage engine.
Because column-based storage engines such as MariaDB Enterprise ColumnStore do not use indexes, relationships must be set up manually. For more about creating relationships in Power BI see Create and Manage Relationships in Power BI.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00581.warc.gz
|
CC-MAIN-2024-10
| 4,395 | 29 |
https://groups.yahoo.com/neo/groups/agile-usability/conversations/topics/453?xm=1&m=s&l=1
|
code
|
RE: [agile-usability] Re: plugging the big picture hole
From: William Pietri [mailto:william@...]>
> On another point, I think your example illustrates the difficulty with
> keeping the "whole product" concept coherent when your only
> representation is story cards and UIs. If you don't have a physical
> artifact to check, it's easy to overlook connections across the parts.
Well, I think it's an intrinsically difficult problem, no matter what
representations you use, especially given that any single representation
necessarily discards a great deal of information.Absolutely, and you're giving us a success case here... I'm not saying we could have done better, only playing with the issues.Personally, I like
something as obviously inadequate as the cards. With a 200-page spec,
people often yield responsibility to the spec. With a stack of index
cards, it's clear who has the answers: the team.
But perhaps I'm using the wrong representations. Let me give you the
full details and you can suggest a representation that would have found
the problem sooner and at a lower cost.
The feature in question was a very simple content management system that
controlled the pages of static content on our site. E.g., who we are,
what we do, the FAQ, our terms and conditions, and so on. It was
scheduled not for the upcoming release, but the one after that.
While we were implementing one of the stories related to payment, a
programmer noticed that we needed more explanatory text on one of the
UIs to convey the full terms. But it was really more text than would
fit, and the best thing to do was to give a short message to satisfy
most users, and link to the terms and conditions for the few that wanted
The static content story, though, was scheduled in the following
release. So we, as a group, spent perhaps ten minutes talking over
alternatives. Eventually, we split the story in two, putting the
necessary part of it in this release and the fancier features in the
next.Total cost of this change was perhaps one person-hour of discussion, and
perhaps two minutes updating our artifact. The HTML mockups were
ignored; they're only kept fresh when the designer is thinking hard
about the future or when they're the best way to communicate the details
of a feature we're building that week.
What representation would have you used to detect this scheduling error
sooner, and at lower cost?Our approach to this is through what we call a software floorplan or User Environment design. It shows all user-visible features and how they are arranged into coherent screens/windows/pages. When we're planning releases (haven't used this in an agile project) we do cuts across the floor plan and run a discussion of whether the cuts are coherent--each delivers complete, useful function and can be delivered independently. So in theory, running such a process would have identified the problem.In practice, such a discussion takes a good deal more than an hour. Besides, this was an additional need discovered during implementation--we might have found it up front, but might not.What I'm wondering about is whether maintaining such a "floorplan" could be useful for keeping design coherence on the user experience side. So in your case, you would have walked to the floorplan on the wall, which might have been marked in colors to show what was being delivered in this release and the next. You'd make your decision, and draw a box to represent your detailed terms box, in the color for this release. If any other user-visible features were affected by moving the static content work into this release, you'd change the color on those. Then you'd split the story and be done.Benefit is that the next person who's looking at what's happening in this release--maybe another team member discovers another change that depends on some static content work--only has to go glance at the plan to see what you've done.Does that seem potentially useful?Hugh
- --- In [email protected], "Ron Vutpakdi"
> On the other hand, the core problem wasn't one of which development
> process was used during the implementation. The core problem was
> of poor management. I still believe that the toughest part ofhaving
> a successful project isn't the design (internal or interaction), itcompany,
> isn't the development, and it isn't the testing: it's the human
> element of working with each other, management, others in the
> customers, and users.this jives with my experience as well -- cheers, Cecilia
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.4/warc/CC-MAIN-20170322212950-00166-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 4,480 | 43 |
https://learn.microsoft.com/en-us/answers/questions/32475/problem-with-printing-from-outlook-365
|
code
|
Q&A currently supports the products listed over here https://learn.microsoft.com/en-us/answers/products (more to be added later on).
You can reach the experts in the dedicated Microsoft Outlook forum over here:
(Please don't forget to accept helpful replies as answer)
Have done that again now but same result as I tried to fix it like that before. Does not work. As said the same problem appears if trying to print as PDF.
It seems like a Windows profile issue. Can you create a new user in the computer and login with the new user. Try a print again. If it looks fine, then you can try re-installing Office in the original user login
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945248.28/warc/CC-MAIN-20230324051147-20230324081147-00155.warc.gz
|
CC-MAIN-2023-14
| 635 | 5 |
http://www.edugeek.net/forums/windows/print-10293-gpo-settings-display.html
|
code
|
GPO Settings Display
I work in different schools over different days, and a recurring problem i've found is in Group Policy Management. When trying to view the settings for an existing group policy object, instead of displaying the settings it just displays "An error occured while generating report: An unknown error occurred while the HTML report was being created."
This makes it a long, time consuming task to go through every setting to figure out what the policy does. When trying to copy the object, the copy has the same issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447563486.62/warc/CC-MAIN-20141224185923-00063-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 535 | 3 |
https://forum.duolingo.com/comment/224121/%C3%8Ates-vous-avocat
|
code
|
"Êtes-vous avocat ?"
Translation:Are you a lawyer?
but both are possible, right? This About.com article uses exactly this example and indicates both translations as correct: http://french.about.com/library/weekly/aa032500.htm
Not exactly. For clarification, what you suggests only refers to subject "il" or "elle":
he is a lawyer = il est avocat (no article) or c'est un avocat (il est + modified noun changing to c'est + modified noun).
she is a lawyer = elle est avocate or c'est une avocate
I am / you are / we are / they are lawyer(s) = je suis / tu es / nous sommes / ils/elles sont avocat(e)(s)
Strange! I can't believe I've never heard that ... I've been learning French for nearly ten years now; you'd think it would've come up at some point! Now I have to go question my entire French education thusfar ... :\
I wonder -- firstly, where did this rule come from? With most of the other forbidden liaisons, it's fairly clear why they exist. But other than avoiding the occasional awkward sound, I can't say I really see what the purpose of this one is. Also, (I'm sure this varies regionally and such, but in general), I wonder if this is a rule strictly adhered to in informal / everyday French?
I saw it here: http://french.about.com/library/pronunciation/bl-liaisons-f.htm . A quick google also gives me: http://www.spellandsound.com/french-liaisons/ but this site says it's a forbidden liaison between inversions using on, ils, and elles and past participles.
Besides that, I found no other mentions online of this rule I cited a year ago, so probably I am just wrong.
Would be nice if some native French speakers could weigh in. :)
Reminds me of the English word "advocate", which can mean "a person who pleads the cause of another" sometimes in a court of law.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303717.35/warc/CC-MAIN-20220121222643-20220122012643-00383.warc.gz
|
CC-MAIN-2022-05
| 1,774 | 13 |
http://www.cargadetrabalhos.net/2017/03/19/front-end-web-developer-8/
|
code
|
As a Front-End Web Developer you work in a highly creative, collaborative, and agile environment.
You have a passion for the web and the skills to create future-friendly websites using the latest techniques and most importantly, follow industry standards.
You are comfortable delivering projects under aggressive timelines while maintaining a high degree of quality.
Essential Duties and Responsibilities:
Think, respect and develop with web standards;
Construct websites by hand-coding, clean, organized, and structured HTML/XHTML and CSS;
Experience de-bugging cross-browser issues;
Deploy websites from staging server to live environment;
Familiarity with Git code management (Bitbucket)
Meet all project deadlines including updates on websites;
Interact smoothly and effectively in a team-oriented environment;
Qualifications / Requirements:
Bachelor’s degree; 2+ years of experience in front-end web development;
Up to date with new and emerging HTML5/CSS3 techniques and best practices;
Experience with C++ is a plus;
Knowledge of SQL and relational database design;
Familiar with Dev/Ops concepts (continuous integration and continuous deployment);
Ability to effectively hand-code sites;
Knowledge of browser and client compatibility ;
Enthusiasm and desire to continually learn more about front-end web development ;
Excellent and demonstrated problem-solving skills;
Empresa: Dellent Consulting
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120092.26/warc/CC-MAIN-20170423031200-00263-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,406 | 22 |
https://forums.positech.co.uk/t/updated-download-to-improve-long-term-playability-of-game/1163
|
code
|
Update: This post now includes the link to the new upgrade for version 1.11. If you have now upgraded to Democracy 2 version 1.11, you will need to redownload the mod in this thread and reinstall it.
I’m sure that most people who have the game and are reading this forum think that Democracy 2 is a great game. However, one thing that did need working on was its long-term playability, the fact that it gets easier after a few terms.
That’s why I have released a significant enhancement for the game, which makes a major improvement on the long-term playability of the game. Basically, it makes situations (such as street gangs, contagious diseases, tax evasion, etc.) harder to deal with as you become more successful. Thus, if you do not keep improving your country in every area, problems that you thought had gone away may come back. This largely reflects the complacency and raised expectations that your voters develop over time.
So, what do you need to do? All you have to do is to download the new situations file from positech.co.uk/democracy2/ho … pgrade.zip - then just unzip the folder and run the auto-installer - it’s that simple. This file is designed to work with version 1.11, the current release version.
Any feedback would be much appreciated. Thanks.
This is a great idea. I will do a last minute fix to 1.05 to ensure the effect is hidden for situations.
As the new version 1.05 has now been released and the situations file has been modified on it, you will need to redownload and reinstall this mod. You can download it from the same location as above - thomashughes.co.uk/democracy … pgrade.zip
Thanks to Cliff the display problem that occurred with my mod for the previous version has now been fixed. Installing the new version 1.05 and my situations file mod should significantly improve the long term playability and difficulty balance of the game.
Has anyone tried this? Any feedback?
Yes, I am using it.
As for stability, it is completely stable, and works fine .
Ill respond with further comments later.
Excellent. With all the messing around I’ve been doing on mods, coupled with having an essay to write for University, I haven’t had the chance to test it properly yet, so any feedback would be appreciated.
If you have installed this mod in the past, your situations file has probably been overwritten by the standard one at some point during patching or reinstallation.
I’ve now uploaded a new version of the file, which has all the latest tweaks put in by Cliff. Also, I’ve tweaked the rail strikes situation, which is too hard to deal with, and replaced it with values suggested by Cliff on this forum when I reported the problem.
You can download it from the link above.
Cliff - Would you please update the version on your server with the version I have just uploaded - link in top post. Also, would you place a short explanation of what it does on the mods list page, as at the moment just giving the name of the zip file doesn’t really explain what it does. Thanks.
OK, I’ve put up a new version of the file. This is based on the very latest 1.11 version, so has the internet crime situation in and any other tweaks that have been made. The underlying idea is the same as it always was - to make situations harder to deal with as the game progresses.
If you have installed it previously and have since patched your game, you will have overwritten this file and will need to install it again. Link is in the top post in this thread.
Cliff, could you please replace the old version on your server with this new version? Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00712.warc.gz
|
CC-MAIN-2022-27
| 3,586 | 20 |
http://www.shopstyle.com/p/hogan-studded-clutch/443331801
|
code
|
Hogan Studded clutch
Studded clutch by Hogan. In studded leather in black calfskin. It has a zip compartment and a primary zip compartment with magnets. One inside zip pocket. One chain shoulder strap, 120 cm to be worn across the body.##Removable shoulder strap 120 cm ##It s the essential clutch for the season! If you want to be trendy, opt for studs. This Hogan clutch in black leather and studs will give the impression of an anarchist look. We love to provoke while being chic, so this clutch is for you!
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829916.85/warc/CC-MAIN-20140820021349-00275-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 510 | 2 |
http://stackoverflow.com/questions/8420962/validates-associated-what-is-it-really-good-for?answertab=votes
|
code
|
I have read the source code of several Rails apps but have never seen this method in use. Also, the documentation isn't particularly clear on when to use it.
EDIT: Have you used validates_associated in your projects? What were the use cases?
Sign up using Google
Sign up using Facebook
Sign up using Stack Exchange
3 years ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064167.28/warc/CC-MAIN-20150827025424-00263-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 326 | 6 |
https://polyverse.com/pages/boost-install-run
|
code
|
Boost Visual Studio
Learn how to install and run Boost
Click Install in the Marketplace
Click on Install in the Marketplace and it will ask permission to redirect to your local instance of Visual Studio Code.
Give permission (if prompted)
Install in Visual Studio Code
In most cases Boost will now automatically install. If it doesn't just click the "Install" button and Boost is now ready to go!
Boost will appear in your VSC extensions list
Learn more about Boost in the main window
To use Boost click on the Boost logo in the left extension panel
IMPORTANT: The first time you start scanning code with Boost...
You will see approval request prompts to connect Boost.
You must have a GitHub account and use that associated account token when you use Boost.
WE DO NOT STORE YOUR DATA. We just need an authentication token to connect Boost to your GitHub.
Be sure to approve / allow this connection to your GitHub account or Boost will not work correctly.
Can't find what you're looking for?
Send us an email to tell us what's up and someone from our Customer Service team will get back to you as soon as possible. Be sure to include your order number (if you have one).
Please email us at [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00117.warc.gz
|
CC-MAIN-2023-50
| 1,220 | 18 |
https://github.com/drk1wi/Modlishka/issues
|
code
|
What looks like blank site with appropriate footer at the bottom
Jun 5, 2019 by
Redirecting client to (targetdomain).onion && mispelling of onion issue
May 23, 2019 by
How to change the loopback.modlishka.io domain to localhost for portforwarding with ngrok?
Apr 30, 2019 by
Unable to sign in to your Google Account: Delete cookies
Feb 18, 2019 by
tls: failed to find any PEM data in certificate input . Terminating. enhancement
Jan 19, 2019 by
ProTip! Updated in the last three days: updated:>2019-06-16.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999141.54/warc/CC-MAIN-20190620044948-20190620070948-00063.warc.gz
|
CC-MAIN-2019-26
| 505 | 11 |
https://progameguides.com/wild-hearts/how-to-fix-missing-save-file-bug-in-wild-hearts/
|
code
|
There's nothing more frustrating than losing your hard-earned progress in a game. Especially in a game like Wild Hearts, with challenging bosses that take grit to overcome, losing your save file can be disheartening and cause you to lose motivation for the game. Several players have reported that their progress was lost after a popup appeared, stating "Your game save is missing and can't be retrieved from the cloud." If you see this popup, don't worry, all is not lost. Here's how to fix the missing save file bug in Wild Hearts.
How to fix save file can't be retrieved from the cloud error in Wild Hearts
When you encounter this error, you should see a popup window that reads, "Your game save is missing and can't be retrieved from the cloud, either start over with new data or wait five minutes and try again." There are two options below this message, either you can press Okay or No. Press No, since pressing Okay may create a new file that overwrites your current save file.
Next, close the EA application from the system tray. If Steam is open, close that application as well, which can be done through the system tray. Now, restart Steam, and relaunch Wild Hearts. This should resolve the issue, preventing the popup window from appearing. Most times, this error message is faulty, and it mistakenly rewrites your save file to fix a problem that actually isn't there. If this popup window appears once more, simply repeat the fix to avoid lost progress.
For more Wild Hearts guides, come check out How to improve PC performance in Wild Hearts here on Pro Game Guides.
Write A Comment
How to fix missing save file bug in Wild Hearts
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00622.warc.gz
|
CC-MAIN-2023-14
| 1,643 | 7 |
https://mail.coreboot.org/pipermail/coreboot/2007-April/020297.html
|
code
|
[LinuxBIOS] Random Bios Postcodes after 0x88 with 440BX
roger at eskimo.com
Thu Apr 26 12:03:50 CEST 2007
On Thu, 2007-04-26 at 00:36 -0700, roger wrote:
One last note, with LinuxBiosv2 code that was imported from LinuxBiosv1:
The w83977ef code used in LinuxBiosv1 had an "ifdef" for the TF chip version to enabled "CIR_DEVICE=6".
For the EF chip version, this isn't needed.
The LinuxBiosv1 code defined the iobase for each device while the LinuxBiosv2 code for the w83977tf defines the for plugandplay?
Noticing maybe a different iobase instead of 0x3f0 being used.
Well, I'll research the w83977* specs.
Key fingerprint = 8977 A252 2623 F567 70CD 1261 640F C963 1005 1D61
Thu Apr 26 02:58:02 PDT 2007
More information about the coreboot
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893300.96/warc/CC-MAIN-20180124030651-20180124050651-00047.warc.gz
|
CC-MAIN-2018-05
| 738 | 13 |
https://www.paypal-community.com/t5/PayPal-Payments-Standard/Continue-Shopping-Link/td-p/2558645/page/2
|
code
|
New to the community? Welcome! Please read our Community Rules and Guidelines
My site also has the Continue Shopping link issue of not enabling customers to be returned to a specific page.
I thought I had the matter resolved by developing a generic page with links back to pages until I sought to connect that link to the Continue Shopping button. No luck hence coming to this community.
Is anyone aware of a means to connect a page URL to the Paypal Continue Shopping button? Today I had to manually coach two customers online on how to continue their shopping.
My "continue shopping" link in the cart is taking people back to the cancellation page instead of the page they were previously on ... wish it were the main page or any other page on my website. It's not canceling any items in the cart but the customer does not know that. How do we fix this problem?
I figured out a workaround on this which involved having both an index.html page and a nearly duplicate Home.html page for the site which uses paypal for alumni dues payments. The only difference between the two pages is that the landing page (index.html) has this code at the end of the <head> section:
var url = 'https://www.[websiteURL]/[Paypal-Payment-Page].html'; // you need to know where you want to redirect to beforehand
if (window.history.length > 2)
window.location.href = url;
With this code, the page that you want to return to is the Paypal-Payment-Page url.
The code checks the history of the site access, and if one has already visited the index URL (which is always the default landing page for the website URL), one is redirected from the index URL back to the PayPal payment page URL.
Once on the site, set any return to the home page to the Home URL instead of the index URL.
Hope that makes sense.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585305.53/warc/CC-MAIN-20211020090145-20211020120145-00234.warc.gz
|
CC-MAIN-2021-43
| 1,782 | 13 |
http://www.godtube.com/cm103101/favorites.html
|
code
|
Connecting the DotsWhat good work is God doing in your life?
Top Music Videos
cm103101's FavoritesBack to cm103101's channel.
- Cinderella - Steven Curtis Chapman (Official Music Video)A special song inspired by a father. Official music video for Cinderella by Steven Curtis Chapman. Buy the album here: http://itunes.apple.com/u...steven-curtis-chapman00:04:21
- Everybody Loves "More Like Falling in Love" by ...The song "More Like Falling in Love" by Jason Gray is so catchy that no one can stop singing it! Check out some of your favorite artists and radio stations singing along.jason-gray00:04:01
- Dave Barnes - God Gave Me You (Official Music Video)Official Music video for "God Gave Me You" by Dave Barnes. (C) 2010 Razor & Tiedave-barnes00:03:52
- YOUR GREAT NAME - (New Worship Song) Lyrics and Music Worship leaders, add this powerful song to your worship sets in your church services. A free chord chart is available for download at www.KrissyNordhoff.com. Your Great Name was written by Integrity Music worship leader Michael Neale and Independe...spiritfitmusic00:05:50
- ROYAL TAILOR - HOLD ME TOGETHERRoyal Tailor, performing Hold Me Together, from the album, Black White. Album available now: http://itunes.apple.com/us/artist/royal-tailor/id433402800royal-tailor00:03:26
- Sanctus Real and the Story Behind The RedeemerSanctus Real talks about the story behind their song The Redeemer. Buy Now: http://itunes.apple.com/us/album/pieces-real-heart-deluxe-edition/...sanctus-real00:06:07
- Royal Tailor - Make A MoveMake A Move is available on Royal Tailor's debut album Black White, now available in stores and on iTunes http://itunes.apple.com/us/album/black-white/id439914111...royal-tailor00:03:42
- Britt Nicole - All This Time (Official Lyric Video)Britt Nicole - All This Time
The Official Lyric Video
Buy it now: http://itunes.apple.com/us/album/all-this-time-single/id495284220britt-nicole00:03:26
- Kari Jobe - We Are (Official Acoustic Performance)Kari Jobe delivers a powerful and intimate acoustic performance of the hit single "We Are." Buy it here: http://itunes.apple.com/us/artist/kari-jobe/id136770805kari-jobe00:03:36
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194600.27/warc/CC-MAIN-20170322212954-00428-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,152 | 14 |
https://ariscommunity.com/users/krish2016/2016-02-05-aris-publisher-cant-load-profiles
|
code
|
Can anybody help me..Please
I can't access publisher with own network Id and but able to login thru system id , but i can't see any profiles. we have already an active profile and it is active. Not sure where to start this issue?
any help in this matter greatly appreacited
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00442.warc.gz
|
CC-MAIN-2023-50
| 273 | 3 |
https://musicofdavidbowie.com/is-map-better-than-for-loop/
|
code
|
Is map better than for loop?
In the same way that the code inside of our for loop is called as long as the condition is true, the code inside of map() is called one time for each element in the array. This does the same thing as our for loop, but the big difference is that the conditions for iteration are handled for us.
Is a while loop iteration?
The “while” loop A single execution of the loop body is called an iteration. Any expression or variable can be a loop condition, not just comparisons: the condition is evaluated and converted to a boolean by while .
Which loop is faster in C?
each loop on the list is faster. Let’s compare the While loop on the list and an array. And the output of While loop is as below. The While loop is faster at looping through the list.
How do you write an infinite loop?
To make an infinite loop, just use true as your condition. true is always true, so the loop will repeat forever.
What is for loop and while loop?
for loop: for loop provides a concise way of writing the loop structure. Unlike a while loop, a for statement consumes the initialization, condition and increment/decrement in one line thereby providing a shorter, easy to debug structure of looping.
Why do we use for loop?
A “For” Loop is used to repeat a specific block of code a known number of times. For example, if we want to check the grade of every student in the class, we loop from 1 to that number. When the number of times is not known before hand, we use a “While” loop.
What is a while loop in Java?
Java while loop is a control flow statement that allows code to be executed repeatedly based on a given Boolean condition. If the condition evaluates to true then we will execute the body of the loop and go to update expression.
Is map faster than for loop Python?
They are two orders of magnitude faster than Python’s built-in tools. Of Python’s built-in tools, list comprehension is faster than map() , which is significantly faster than for . For deeply recursive algorithms, loops are more efficient than recursive function calls.
Why is Cython?
Cython is a popular superset of Python. As a compiled programming language, Cython helps programmers to boost performance of code with C-like performance. The developers can load and use the extension modules directly in the Python code through the import statement.
Are loops slow in Python?
Looping over Python arrays, lists, or dictionaries, can be slow. Thus, vectorized operations in Numpy are mapped to highly optimized C code, making them much faster than their standard Python counterparts.
Are list comprehensions faster?
Geophysical Consultant / Software Developer where a list comprehension and for-loop run time is compared for a simple function of multiples of 2 in each loop. The results showed that list comprehension was twice faster than for-loop.
What is loop and its types with example?
Loops are of 2 types: entry-controlled and exit-controlled. ‘C’ programming provides us 1) while 2) do-while and 3) for loop. For and while loop is entry-controlled loops. Do-while is an exit-controlled loop.
What is faster map or list comprehension?
List comprehension is more concise and easier to read as compared to map. List comprehension are used when a list of results is required as map only returns a map object and does not return any list. Map is faster in case of calling an already defined function (as no lambda is required).
What are different types of loops in Java?
Java provides three repetition statements/looping statements that enable programmers to control the flow of execution by repetitively performing a set of statements as long as the continuation condition remains true. These three looping statements are called for, while, and do… while statements.
Which loop is more efficient?
Generally, the for loop can be more efficient than the while loop, but not always. The idea of the While loop is: While something is the case, do the following block of code. In this code, we have defined a variable name condition, and condition starts at a value of 1.
Which loop is faster in Java?
Iterator and for-each loop are faster than simple for loop for collections with no random access, while in collections which allows random access there is no performance change with for-each loop/for loop/iterator.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943562.70/warc/CC-MAIN-20230320211022-20230321001022-00034.warc.gz
|
CC-MAIN-2023-14
| 4,326 | 32 |
https://www.freelancer.com/projects/angular-js/Angular-PWA-web-push-notification/?ngsw-bypass=&w=f
|
code
|
I want to setup the Angular 6 PWA and push notification project. Based on the tutorial I have set up the project. but it's not working. I need help in debugging and set up the project. No coding or very less coding required. I can share my screen through zoom app.
*Note: I will pay only if project successfully configured and working. No partial payment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360107.7/warc/CC-MAIN-20210228024418-20210228054418-00574.warc.gz
|
CC-MAIN-2021-10
| 355 | 2 |
https://beginlinux.wordpress.com/tag/backup/
|
code
|
Customize the User Environment
The environment is comprised of a series of settings that provide a look and feel that the user is comfortable with or that the corporation deems necessary to create a productive work setting. Bash provides systematic ways to setup an environment that will meet your needs to help you function more effectively. One of those settings should be some kind of automatic backup when you logout for the day.
There are three files that are read when a user logs in and out. These files are typically in the user directory by default when using the bash shell. The files are hidden files so they are preceded by a “.” and may be viewed by using the command:
The files are .bash_profile, .bash_logout, and .bashrc. If these three files do not exist in your home directory they can be created by using a text editor like vi.
You may also see .bash_history which keeps a list of the commands that the user has executed.
Any changes you make to this script must be saved and then you must logout and login again. However it is possible to use the source command which will run all of the commands that are in the script:
Now there is a catch, bash provides a way for a system to use two alternative files other than .bash_profile, these files are .bash_login or .profile. If either of these files is listed and .bash_profile is not then they will run, but if .bash_profile is listed it will run.
The .bash_profile is read by the system and executes any command located there only when a user logs into the system, and not when a user starts a new shell. When the user starts a new shell .bashrc file is read. This setup allows the user to separate the commands needed at startup and those that may be important when starting a subshell.
The .bash_logout provides a way to execute commands when the user logs out of the system. One useful application for this in a user’s home directory is that an administrator can provide a way to kill all of the user’s applications when logging out just in case an application was not closed correctly or that hangs.
Here is an example of a simple command that copies all OpenOffice Writer files to a USB device in a directory called MyDocs when the user logs out.
Create a file named .bash_logout in the users home directory if it has not been created already. In that file use this command in a line and save the file:
cp Documents/*.odt /media/usb/MyDocs
Note the case and that since the command will be issued from the user’s home directory the path is simply the Documents directory. Of course this command will require the user to save all the Writer files they want to copy into the Documents directory or they will not be copied. You will also need a directory called MyDocs in the USB device.
This script will rsync the root user’s home directory to a local backup.
Open .bash_logout or create it with vi .bash_logout in the root user’s home directory. Create a backup directory with:
Of course this location should be on a separate drive and you will need permissions to access that drive. It could be a USB drive that is mounted as /bk.
Enter this line of code in the .bash_logout:
rsync -avz –exclude=*.rpm /root/ /bk/root_bk
chmod -R 700 /var/root_bk
Test the script by logging out and then login in again.
Simple script but you get the idea. Placing an automatic backup in that logout script will be worth gold if you have problems with your drive.
The rsync command will create an exact copy of your information in a new location based on what has changed. It takes a look a timestamps to determine what file have changed. This synchronization process is a reliable way to keep two directories exactly the same.
The Trailing Slash
It is important to understand the difference in use with or without the trailing slash.
rsync -av /home/office/ /bk
This example does not move the office directory folder only the contents.
rsync -av /home/office /bk
This example will result in the office directory located under the /bk = /bk/office.
Note the differences and choose the method you want to use for your backups.
If you want to make your transfer smaller then use the -z option to compress your transfer.
rsync -avz /home/office/ /bk
Archive Mode -a
This will ensure that all symbolic links, devices, attributes,permissions, ownerships,etc. are preservered and transferred. This is the same as rlptgoD
This will provide you with information.
Get Stats on Transfer –stats
rsync -avz –stats /home/office/ /var/bk
Here is an example of the stats you will have available.
Number of files: 324352
Number of files transferred: 70613
Total file size: 20610660916 bytes
Total transferred file size: 11504455981 bytes
Literal data: 11504455981 bytes
Matched data: 0 bytes
File list size: 17670110
File list generation time: 37.718 seconds
File list transfer time: 0.000 seconds
Total bytes sent: 11527010557
Total bytes received: 1887490
sent 11527010557 bytes received 1887490 bytes 21212323.91 bytes/sec
total size is 20610660916 speedup is 1.79
File size Transferred
Exclude a Pattern
rsync -avz –exclude=*.rpm –stats /home/office/ /var/bk
Linux Training Packages CLICK HERE
Create an exclude file.
If you have a number of extensions you want to exclude, create a file and then tell rsync where the file is so that these extensions or patterns will not be transferred.
rsync -avz –exclude-from=/home/office/exclude –stats /home/office/ /bk
Here the file containing the patterns is listed by using –exclude-from= followed by a path to the file. As you can see the patterns in the file are not transferred.
home/office/exclude file contents, one pattern on each line.
This script will sync the /home where user mail is kept to a directory on a separate drive. Once the file is synced then it will be backed up with a tar command in the example above.
/usr/bin/rsync -a – -verbose – -stats /home /bk/home
if [ $? -ne 0 ]; then
Crontab By using crontab -e you will be able to setup cron jobs that will run the two scripts above as often as you need.
17 8-17 * * * /root/rsync.sh
47 8-17 * * * /root/bk.sh
If you created a script like this, below is the output.
/usr/bin/rsync -a –verbose –stats /home /bk/home
Number of files: 8195
Number of files transferred: 7376
Total file size: 6677491116 bytes
Total transferred file size: 6677490762 bytes
Literal data: 6677490762 bytes
Matched data: 0 bytes
File list size: 218205
Total bytes sent: 6678839831
Total bytes received: 147540
sent 6678839831 bytes received 147540 bytes 12045062.89 bytes/sec
total size is 6677491116 speedup is 1.00
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.65/warc/CC-MAIN-20170322212950-00221-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 6,582 | 78 |
https://moodle.org/mod/forum/discuss.php?d=28152&parent=217517
|
code
|
Make a backup !
Install the side bar block from this discussion
Put the glossary inside the sidebar block
Now hide the sidebar block
Please be cautious trying this out. I haven't used the sidebar block, so I don't know how well it behaves. I'd like to hear other peoples ideas on this, especially on how well backup/restore of a course work when you add activities to the sidebar instead of to the main course section.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304261.85/warc/CC-MAIN-20220123111431-20220123141431-00486.warc.gz
|
CC-MAIN-2022-05
| 418 | 5 |
http://forums.fedoraforum.org/showthread.php?p=1546177
|
code
|
Yeah. I recompiled the acpi_call module and by using it battery life is now even longer.
And wha'ts even better, suspend now works!
Blacklisting nouveau and nvidia seemed to do it, and by adding
echo '\_SB.PCI0.PEG0.GFX0.DOFF' > /proc/acpi/call
at the buttom of the resume|thaw) section to the suspend script /etc/pm/sleep.d/20_custom-ehci_hcd disables the card again upon resume.
(The one i'm using can be found here
Then i just created a script to disable the card and added it to startup applications:
#Disable nvidia card
sudo insmod /home/esben/acpi_call/acpi_call.ko
sudo sh /home/esben/acpi_call/test_off.sh
Thanks for your help guys
Unless you have anything to add, ill mark this thread as solved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383259/warc/CC-MAIN-20130516092623-00020-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 705 | 12 |
http://www.imdb.com/character/ch0042816/filmotype
|
code
|
From "War and Remembrance: Part 11 (#1.11)"
Capt. Victor 'Pug' Henry
[Talking about marriage
] It can't work, Pam. I'm twice your age, a man with grown children and most of his life behind him. And I'm married.
] Victor, don't you understand? You are life itself to me!
[after he kisses her
And it so happens I'm such a raw slut I won't take no for an answer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698544097.11/warc/CC-MAIN-20161202170904-00024-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 359 | 7 |
https://packages.debian.org/de/bullseye/ruby-ast
|
code
|
Paket: ruby-ast (2.4.1-1)
Links für ruby-ast
Quellcode-Paket ruby-ast herunterladen:
- Debian Ruby Extras Maintainers (QS-Seite, E-Mail-Archiv)
- Miguel Landaeta (QS-Seite)
- Utkarsh Gupta (QS-Seite)
- Homepage [whitequark.github.io]
Ruby library for working with abstract syntax trees
ast embraces immutability; each AST node is inherently frozen at creation, and updating a child node requires recreating that node and its every parent, recursively.
This is a design choice. It does create some pressure on garbage collector, but completely eliminates all concurrency and aliasing problems.
See also AST::Node, AST::Processor::Mixin and AST::Sexp classes for additional recommendations and design patterns.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153515.0/warc/CC-MAIN-20210727233849-20210728023849-00098.warc.gz
|
CC-MAIN-2021-31
| 709 | 11 |
https://www.blender.org/conference/2016/presentations/280
|
code
|
(Applied uses of Blender)
Hansi spent the last two years programming a "3d oscilloscope music" synthesizer, a musical genre that does not (yet) really exist. The challenge is to craft special stereo waveforms that appear as geometric shapes when viewed in an x-y plot such as an oscilloscope or a vector scope.
Blender objects and animations are used as the main source of timbre and geometry.
The application is created in accord with Jerobeam Fenderson, and will be released at the same time as his album "Oscilloscope Music".
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247487624.32/warc/CC-MAIN-20190218175932-20190218201932-00089.warc.gz
|
CC-MAIN-2019-09
| 528 | 4 |
http://www.pearltrees.com/u/14039581-lxml-processing-html-python
|
code
|
Lxml - Processing XML and HTML with Python
lxml is the most feature-rich and easy-to-use library for processing XML and HTML in the Python language. The lxml XML toolkit is a Pythonic binding for the C libraries libxml2 and libxslt. It is unique in that it combines the speed and XML feature completeness of these libraries with the simplicity of a native Python API, mostly compatible but superior to the well-known ElementTree API. The latest release works with all CPython versions from 2.4 to 3.3. See the introduction for more information about background and goals of the lxml project. Some common questions are answered in the FAQ.
Related: Python Forum Scraping
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316785.68/warc/CC-MAIN-20190822064205-20190822090205-00451.warc.gz
|
CC-MAIN-2019-35
| 669 | 3 |
http://superuser.com/questions/tagged/dell-vostro+display
|
code
|
I have a Dell vostro 1500 laptop and my display is not working. I mean by not working is it is not showing anything on the screen except some vertical lines..when i connected the external monitor it ...
i hope someone can help me with this problem. I have a Dell vostro 1310 Laptop with 32 bit vista and a 8400M nVidia chip. Recently i have noticed performance issues when my girlfriend was playing ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124607.22/warc/CC-MAIN-20140914011204-00014-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 402 | 2 |
https://jesses.dev/tag/learning?source=tags_bottom_blogs
|
code
|
Read more stories on Hashnode
Articles with this tag
... except when they do · Cover photo - contextualelectronics.com
tl;dr What DOES work
The 3 F's
When I think of tooling, I think of my dad's electronics...
Power savings for fun and profit! · Intro 👋
I've been playing quite a bit with my new (old) laptop, a Dell Latitude 7490. Great laptop for sure. Feel...
Cannot stop, won't stop · Initial Commit
It's been a while since I've written anything substantial in Python.
Up until this point, I've mostly just...
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00054.warc.gz
|
CC-MAIN-2024-18
| 519 | 11 |
http://www.geekstogo.com/forum/topic/260582-hard-drive-almost-full/page-4
|
code
|
Hard Drive Almost Full
Posted 08 December 2009 - 05:28 AM
The Hard Drive IDE cable should also have two IDE connectors, meaning one spare, so I strongly recommend that one for the connection. Then the current drive would be Master (most likely is already), and the new one can become Slave.
Mary Poppins, is the case Ron posted in #35 what you have? Please take a photo of the inside of your case and upload it so I can tell you where this should go.
Posted 08 December 2009 - 06:21 AM
No Troy I used that picture as a reference for Mary Poppins to see the inside of the case where HD bays are.
Mary Poppins, is the case Ron posted in #35 what you have?
The reason for the way it is being done is ease for Mary Poppins.
I agree the way you are saying is the way to ideally do it and I would be willing to do that if Mary Poppins would like to.
Posted 08 May 2010 - 05:51 AM
Posted 09 May 2010 - 05:14 AM
Posted 10 May 2010 - 06:50 AM
Funny thing is, I just decided to add to it without checking the date!! D'oh!!
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863519.49/warc/CC-MAIN-20180620124346-20180620144346-00498.warc.gz
|
CC-MAIN-2018-26
| 1,084 | 15 |
http://sqlhjalp.blogspot.com/2011/10/thank-you-rmoug.html
|
code
|
I big thank you to the Rocky Mountain Oracle Users Group (RMOUG) because, they invited me out for a night of MySQL for Oracle DBA's. It was a great night. I took feedback from OOW and rebuilt a presentation just for them. I also built out a hands on lab for MySQL and let them loose...
Over those 2 hours we covered the basics of MySQL and everyone got to get their hands into the MySQL 5.5 Database via the command line. They then walked away with another hands on lab for MySQL Workbench.
I wish them all the best and I appreciate the positive feedback.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593051.79/warc/CC-MAIN-20180722061341-20180722081341-00147.warc.gz
|
CC-MAIN-2018-30
| 555 | 3 |
https://lj-userdoc.livejournal.com/21890.html
|
code
|
That line has also been responsible for on average of 1 to 3 support requests a day being opened asking How do I earn support points? or simply What are support points?
I've crafted the following FAQ out of one of sonicice's answers to such a support request. Could someone please create it, and then link to it from FAQ #103.
What are support points?Support points are earned by helping users out on the Support area. Users start out by giving screened answers which need to be approved, and after a while of giving 100% correct answers, they may be given support privs and will be able to give normal, unscreened answers, make comments, approve screened answers and internal comments. Once a screened answer is approved, it becomes a regular answer and the support case is marked as answered and ready to be closed. When the user closes the thread, the points are assigned to the person who the user felt helped them the most, or the user can choose to assign no points at all. Only one person may receive points for that question. If you want to start helping out so you can earn points, read the Support Guide and watch the Support Community lj_support.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.56/warc/CC-MAIN-20211020024111-20211020054111-00602.warc.gz
|
CC-MAIN-2021-43
| 1,157 | 3 |
https://stormagic.com/company/blog/software-defined-storage-goes-mainstream-release-windows-server-2016-part-2/
|
code
|
StorMagic CEO, Hans O’Sullivan, examines the release of Windows Server 2016 and with it, Storage Spaces Direct in this three part series of blogs. Part 2 delves into the details of Storage Spaces Direct.
Software-defined storage (SDS) solutions have been around for several years and with Microsoft’s Windows Server 2016 launch that includes Storage Spaces Direct, which will now go mainstream. Simply put, when Microsoft steps into a market, IT professionals take notice. Microsoft’s validation of SDS will ensure it quickly emerges from, arguably, a large niche into the mainstream. At the same time, this will create a market 10x bigger fueled by the availability of other SDS solutions that ensure IT professionals, inspired by Microsoft’s market entry, always get a choice of ‘best-of-breed’ technologies for their particular needs. StorMagic welcomes Microsoft’s clear commitment to SDS. It paves the way for broader adoption and gives customers confidence that the pioneers in the market, like StorMagic as well as our customers and partners were always on the right track.
Microsoft Takes SDS Mainstream
SDS has been adopted and proven across multiple use cases in the datacenter and at the edge. Microsoft’s entry into the market should now force every IT Professional to ask the question “do I really need a separate storage array for this project or should I leverage SDS?” You might argue that VMware’s entry was also a defining moment for SDS since VMware remains the virtualization market leader, but Microsoft is entrenched as a defacto platform in almost every organization — and Microsoft has plenty of experience taking a niche solution mainstream (the GUI, office productivity applications and thin-client computing were all innovated elsewhere). When Microsoft gets behind a technology, all of its customers — which is basically everyone — will get exposed to the idea. This is especially true when a technology is embedded in the platform, as Storage Spaces Direct is.
What You Should Know About Storage Spaces Direct
There’s is a good write up on TechNet discussing Storage Spaces Direct where you can get a detailed overview. Microsoft have certainly delivered a strong set of features. However a few things stand out that should also draw the IT professional’s attention to the likes of StorMagic.
Requires Windows Server 2016 Datacenter Edition
You need to be ready to deploy the latest versions Windows Server and be prepared to pay for Datacenter Edition. This isn’t practical for many organizations that run existing workloads on Server 2008 or 2012 (or even Server 2003, which according to some reports, has a nearly 18 percent share of on-premises server deployments!). Server 2016 also moves from a per processor to a per core pricing model, which may create challenges for some customers. Particularly take note if you are designing a hyperconverged solution only running a few VMs or software-defined storage array.
Supports Hyper-V only
Pretty obvious but if you are a VMware shop then look elsewhere. StorMagic supports both vSphere and Hyper-V.
The system resource requirements are high
The minimum hardware requirements call for 5GB of memory per TB of cache drive on each server to support metadata. It also calls for 10GbE networking and enterprise-grade SSDs for the cache devices. Buying new systems to specification can be costly. With StorMagic, you can build an all HDD solution, all SSD or any mix that meets your performance needs.
Requires certified matching hardware at a component level
All servers must be identical including components, drivers, firmware and configuration and certified on Windows Server 2016. Because of this, repurposing existing hardware will be difficult and adding hardware in the future will require careful planning and execution. VSA based SDS solutions like StorMagic SvSAN do not have the same restriction, as you can mix any server type in a cluster.
Stretched clusters across sites is not supported
Ensuring site redundancy between buildings and datacenters is a common requirement for StorMagic customers and something you cannot achieve with Storage Spaces Direct.
…now what next?
Read part 3 as Hans explains where StorMagic and other vendors fit now that Microsoft have entered the market.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517018.29/warc/CC-MAIN-20220517063528-20220517093528-00774.warc.gz
|
CC-MAIN-2022-21
| 4,309 | 18 |
http://micama.info/watch/VpYxDDYfZDM
|
code
|
0 Like 0 Dislike
Video For This Week Monster school decided to visit GRANNY HOUSE. If you have not watch the episode 2 yet, click here - https://youtu.be/sBBSF4xzsa4 Monster School : GRANNY Monster School : SCARY Monster School : SPOOKY Monster School : HORROR Music: ✔️https://incompetech.com ✔️NEFFEX - Fight [Copyright Free Trap Music] ✔️Slendrina the cellar Soundtrack If you want to watch more monster school animation click here, My Monster School Playlist - https://www.youtube.com/watch?v=ObCn4yWgmGw&list=PLkIf4V1s9enw1GUsONdRM3M0lz4Odjw8b Brought to you by PlataBush
It's CG, but...you need to watch this. Dead Rising Triple Pack Graphics Comparison: Xbox 360 vs. PS4 (1080 60fps) https://www.youtube.com/watch?v=iYEwgHeRlag Dead Rising Triple Pack Review https://www.youtube.com/watch?v=mXFM6RyDh0Y ---------------------------------- Follow IGN for more! ---------------------------------- YOUTUBE: https://www.youtube.com/user/ignentertainment?sub_confirmation=1 IGN OFFICIAL APP: http://www.ign.com/mobile FACEBOOK: https://www.facebook.com/ign TWITTER: https://twitter.com/ign INSTAGRAM: https://instagram.com/igndotcom/?hl=en WEBSITE: http://www.ign.com/ GOOGLE+: https://plus.google.com/+IGN #deadrising3 #trailer
Take a look at an later section from this psychic-powered, amnesia-fueled adventure. Check out the latest from IGN here! https://www.youtube.com/watch?v=PzxxeLvngB0&list=PLE196726F02565118&index=1 Subscribe to IGN for more! http://www.youtube.com/user/IGNentertainment?sub_confirmation=1 ---------------------------------- Follow IGN for more! ---------------------------------- YOUTUBE: https://www.youtube.com/user/ignentertainment?sub_confirmation=1 IGN OFFICIAL APP: http://www.ign.com/mobile FACEBOOK: https://www.facebook.com/ign TWITTER: https://twitter.com/ign INSTAGRAM: https://instagram.com/igndotcom/?hl=en WEBSITE: http://www.ign.com/ GOOGLE+: https://plus.google.com/+IGN
Planet of the Apes Last Frontier Walkthrough Part 1 - Planet of the Apes Last Frontier PS4 narrative game let's play playthrough review ►Subscribe For More :D - https://goo.gl/MWAMai ►How I record my gameplay: http://e.lga.to/GameRiot ►GameplayOnly (No Commentary) Channel - http://goo.gl/z4enAW ►Join the Network I'm with - https://console.machinima.com/rc/DGBGG-UABBV ►Follow My Twitter - https://twitter.com/gameriotarmy ►Instagram - http://instagram.com/GameRiot ►Facebook - https://www.facebook.com/GameRiot ►Gaming Chair & Wheel Stand - http://goo.gl/oMcDqx (Discount Code - gameriot5)
Past Cure - Indie Game Review My Links - Twitter: https://twitter.com/redzyrussell Steam Curator: http://steamcommunity.com/groups/RedzyIndieGameReviews Past Cure is a dark psychological thriller that blurs the lines between dreams and reality. An intense, cinematic, story-driven experience that challenges the player to use mind-bending mental abilities to survive. Available via steam 23rd Feb: http://store.steampowered.com/app/646050/Past_Cure/ Developed and Published by Phantom 8 Studio Website: https://phantom8.studio Twitter: https://twitter.com/past_cure Facebook: https://www.facebook.com/pastcuregame Instagram: https://www.instagram.com/pastcure Game Description - Past Cure We are developing an “Inception” inspired 3rd person single player game for Videogame console and PC, named “PAST CURE”. It features two worlds, each with a unique set of rules and mechanics, motion-captured fighting and stealth animation, as well as high quality graphics. PAST CURE follows the submerged Elites-soldier, Ian, who with all his might chases the men who once betrayed and transformed him. For years, Ian was the object of secret human trials, held in a dark prison somewhere in Europe. The experiments left him changed. Ian developed powerful skills such as thought manipulation and telekinesis. He paid the price with his sanity. Each time he uses his powers the madness grows in him. This is fully revealed in his dreams – and now stretches its claws to reality. With the help of his brother Markus and the opaque double-agent Sophia, Ian pursues the men in the shadow. He takes on Eastern European cartels, secret lodges and unscrupulous scientists. And he encounters an adversary who does not seem to be of this world Developer Description - The story behind the studio: We are an independent developer studio with our headquarter in Berlin, Germany, a place that gives us our inspiration and drive. We started off in late 2015 with the idea to build a unique and high qualitative independent game. In January 2016 the studio was founded and the first employees joined in March. Our highly motivated & extraordinary performing team currently consists of 10 people, topped with a 2-head management team. All of us share the same passion for gaming. We focus on the essence of making games – gameplay, story, design and fun factor. Tags - Game review, video game review, game reviews, indie game, indie game review, indie games, video game, video game reviews, review, gameplay, lets play, redzy, redzy indie game review, redzy indie game reviews, steam, pc, steam game, steam games, xbox, ps4, playstation, Nintendo, Nintendo switch, early access, beta, alpha, open beta, closed beta,
It's past cure gamepla & past cure walkthrough part 13 without or no commentry.
I'm uploading past cure gameplay or past cure walkthrough for all gamers who love this games. It's also past cure review gameplay. I'm not playing it in ps4 I'm playing it in my PC. Past cure gameplay walkthrough is recorded on 720p hd. In this past cure video game you''ll learn how to combat, how to fight and other skills .
You can watch previous gameplay of my time at portia:
You can watch all past cure gameplay walkthrough if you want:
You can buy the game if you want
Buy past cure steam - Website: http://store.steampowered.com/app/646050/Past_Cure
If you like my gameplay then like, share & subscribe to my channel
Subscribe To MY Gaming Tube Channel: https://goo.gl/mz3Yi2
Follow me On
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863259.12/warc/CC-MAIN-20180619232009-20180620012009-00139.warc.gz
|
CC-MAIN-2018-26
| 6,016 | 15 |
https://android1free.com/2048-balls-merge-3d-balls-1-1-apk-mod-unlimited-money/
|
code
|
Game id: com.bubble.shooter.merge
2048 Balls Merge 3D is 2048 Bubble 3D merge game ! Merge bubbles of the same value ! 2,4,8,16,32,64,128,256,512,1024 and 2048 !
Only %1 can make 2048 Balls in 3D !
How to play:
• Aim for same ball to merge them in 2048 balls in 3D !
• Merge bubbles of the same value
• Score mega points with consequtive merges !
• Make a Twenty 48 bubble to unlock the special bonus in 2048 Balls at 3D !
2048 Bubble can be played offline too !
Completely new perspective to bubble games !
2048 Balls in 3D is the best time killer game. 2048 balls will make you fun and also time will flow like river. Play 2048 balls anywhere,anytime and even offline. Compete with your friends in 2048 balls and beat them ! Enjoy playing 2048 balls and suggest your friends. We look forward to hear from you and get feedbacks to improve 2048 balls further !
Playing 3D 2048 Balls is amazing ! Your aim is to make 2048 Balls. Be careful each of them has different sized. 3D Balls will make them merge automatically if their numbers are equal. 3D 2048 Balls also improves your calculation skills. Aiming is also another key point in 2048 Balls. 3D Balls go directly where you point ! Enjoying merging 3D Balls to make 2048 Balls !
Have fun in Twenty 48 – 2048 Balls in 3D ?
— New Balls
Copyright© 2020 Android1free
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363312.79/warc/CC-MAIN-20211206194128-20211206224128-00361.warc.gz
|
CC-MAIN-2021-49
| 1,328 | 15 |
https://vi.stackexchange.com/questions/3097/indentation-with-start-of-paragraph
|
code
|
When I type
1. blah blah blah Vim recognizes the
1. prefix and it indents the rest of the paragraph tidy.
I would like to configure Vim to do the same thing with
#. literal prefix, since ReST files autonumbers the paragraphs when started with
In this SO answer I got suggested this:
let &formatlistpat = '^\s*\%(\d\+\|#\)[\]:.)}\t ]\s*'
I added this to my .vimrc:
autocmd BufRead,BufNewFile *.rst let &formatlistpat = '^\s*\%(\d\+\|#\)[\]:.)}\t ]\s*'
It doesn't work. In fact, I modified the regexp and Vim seems to ignore anything I put there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00688.warc.gz
|
CC-MAIN-2023-40
| 544 | 10 |
http://endgame.co.uk/idletheory/idle/evolution/idle-life.html
|
code
|
The Idle Life Physical Model.
All science is either physics or stamp collecting.
Physicists have been curiously reluctant to produce a physical model of life. It is not possible to flick through a physics textbook and find a chapter on Life Processes appended to those concerned with the Kinetic Theory of matter, or Thermodynamics, or Newton's laws of motion.
The omission may be purely an accident of history, that the study of life became, very early on, the province of naturalists, biologists, ecologists, and more recently geneticists. Physicists, with enough on their hands already, were perhaps content to leave the matter in their hands.
Yet one strange result is that, despite constant complaints that the life sciences are reductionist and mechanistic, there exists no mechanistic description of life. There isn't even agreement as to what constitutes Life. Thus the Idle Life model will not be found in any physics textbook. Although its description of life adopts the terminology of physics, it is no part of the formal edifice of physics.
The Idle Life model attempts to mirror the behaviour of real life. It has a metabolism that acquires and expends and stores energy. It can grow and reproduce. It can die. Given such a model of life, it becomes possible to construct populations of theoretical idle lifeforms, that correspond to plants, grazers, predators, and simulate variation and natural selection, and to do so knowing that the unfolding scene is not physically implausible. Without some sort of model, such theoretical explorations are impossible.
The Idle Life model is a simple, idealised model of life. There are probably no real living creatures which are so simple. But a great many real living creatures appear to behave in roughly the manner it describes. And that is enough to begin with. Idle Theory is only concerned with the broadest behaviour of life, not with particular details.
In Idle Theory, life is treated in terms of energy. In Idle Theory, living creatures are understood to be constantly decaying and constantly repairing themselves. This is physical work. And in order to repair themselves they have to extract fuel and raw materials from their surrounding environment. This also is physical work.
In physical discussions of life, living creatures are quite ordinarily described as having a power income and a power expenditure . But these incomes and expenditures are usually implicitly continuous. In Idle Theory power income and expenditure are discontinuous or intermittent.
Two assumptions underlie the Idle Life model.
A further argument for intermittency is that if the creatures simply worked continuously, at whatever rate required, to acquire energy to power self-maintenance, they would have no need to store energy. But in the natural world, creatures typically maintain substantial energy stores, in the form of sugars, fats, starches.
Assume some lifeform continuously works at a rate Pm repairing itself.
Assume that it is able to work at a rate Pe to acquire energy to power repair.
When it works to acquire energy, it acquires a power income of Pi. The power income, Pi, that the creature gets for its expenditures is dependent on the energy density of its environent. In an energy-rich environment, Pi will be larger than in an energy-poor environment.
At equilibrium, it alternates between being busy acquiring energy for Tbusy time, and being idle for Tidle time, and its energy store level cycles between a maximum and a minimum.
At equilibrium, over unit time period, energy expended = energy received.
Energy received = Pi.Tbusy
A variant of this equation is:
Given these assumptions, the Idleness of a lfeform is independent of the length of the cycle. It makes no difference whether it maintains its store at a high mean level, or allows its store to cycle more slowly from a high level to a low level.
The power consumption of this lifeform over the cycle is given by:
Idle time need not be devoted to inactivity. A life form can work during idle time to acquire an energy surplus. The power surplus or work capacity of the life form is:
Where a creature is growing in size, or reproducing, the extra power expenditure for reproduction, Pr is added to maintenance power expenditure, and (1) becomes
Living creatures operate in the range 0 to 1 idleness. 0 (0r 0%) idleness means working all the time. 1 (or 100%) idleness means they are idle all the time. In practice, 100% or perfect idleness cannot be achieved, because no combination of non-zero values of Pm, Pr, Pe, and Pi can produce I = 1. Zero idleness, by contrast can be very easily achieved.
Inert matter might be construed as perfectly idle, since (Pm, (Pr and (Pe are zero, and I = 1.
The creatures die when their energy stores empty, and no further maintenance work or energy-acquisition work can be done, and the unmaintained creatures disintegrate.
Taking Pm and Pe as constant, then as Pi rises, idleness approaches 1. In this circumstance a creature spends next to no time meeting its maintenance energy needs. But as Pi falls, idleness falls, and continues to fall until idleness reaches zero. At this point, a creature is spending all its time working to meet its maintenance energy needs. If Pi falls further, the creature becomes unable to meet its maintenance energy needs, because it can work no harder. In this circumstance, it loses energy, and its energy store empties. Thus zero idleness (I = 0) is the threshold of death for any lifeform. In Idle Theory, reaching zero idleness is therefore usually taken to entail death, even though there will be an interval while energy stores are finally depleted.
All solutions of the equation I = 1 - ( Pm / (Pi - Pe)) with values greater than zero and less than 1 correspond to life. All other values (I < 0, I > 1) correspond to death. In practice, these absurd values convert to zero idleness.
Reaching zero idleness is the only way that any life form in Idle Theory ever dies.
In fact, any creature which is continuously busy, yet still losing energy, is likely to stop working and remain idle while losing energy.
Reproduction is regarded as a special case of self-maintenance. Living creatures are continually repairing and replacing their tissues, and the ability to do this implies an ability to assemble entire copies of themselves. If living creatures slightly overmaintain themselves rather than undermaintain themselves, the excess energy they acquire by so doing may be used to construct such copies.
Throughout the Idle Theory website, a rather broader conception of Idleness is employed than simply the fraction of time not spent finding and consuming food. Humans, in particular, are regarded as having to busy themselves in a variety of necessary tasks of one sort or other - where necessary means needed for survival. In cold climates it is necessary, on pain of death or discomfort, for humans to act to keep themselves warm by staying active, wearing clothes, lighting fires, etc. There may well be other necessary activities. Idle Life 2
Author: Chris Davis
First created: Mar 1998
Last Edited: May 2008
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00794.warc.gz
|
CC-MAIN-2024-10
| 7,115 | 34 |
http://stackoverflow.com/questions/18581230/grouping-with-latest-time-from-sql?answertab=oldest
|
code
|
Im trying to make a messaging system, but I'm stuck at a problem for too long now. When I excute my query, it returns the total amount of rows that have time, instead of the time of the latest row.
Anyone know how I can do this?
Ths is my query:
SELECT i.`from` , SUM( i.`read` ) , COUNT( i.id ) , i.`time` , m.username FROM `messages` i JOIN `members` m ON i.`from` = m.`id` WHERE 1 GROUP BY i.`from` ORDER BY i.`time`
I have tried
But that doesn't work.
Not sure what went wrong, but it works now. Here is the new query if anyone wonders how and what.
SELECT i.`to`, m.`username`, max(i.`time`) FROM `messages` i JOIN `members` m ON i.`to` = m.`id` WHERE i.`from` = ? GROUP BY i.`from` ORDER BY i.`time`
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398462686.42/warc/CC-MAIN-20151124205422-00218-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 705 | 8 |
https://www.belatrixsf.com/whitepapers/wso2-best-practices-trenches/
|
code
|
WSO2 Enterprise Services Bus (ESB) and many other WSO2 products provide powerful options to organizations that want to offer digital services to their customers. This document provides an overview of resources and implementation best practices that we have found work effectively based on our experience of numerous WSO2 engagements. Due to the wealth of information available about WSO2 products, rather than re-inventing the wheel, we have compiled here a collection of resources which we have found to be the clearest and most effective.
One of the great benefits of WSO2 ESB and many other WSO2 products is that they are built on the OSGi specification, and as a result can be easily modified. In order to customize your solution it’s highly recommended to follow compatibility recommendations which WSO2 provides.
It is even possible to execute an OSGi console to search for potential issues on installed features. This blog post provides an excellent overview.
A final note on a la carte solutions is to take special care about the fact that of course not all products or features are candidates to work in single processing node. Products such as WSO2’s Data Analytics Server or Identity Server will perform much better in their own environment.
WSO2 ESB enables the implementation of many Enterprise Integration Patterns (EIP), so before you take any integration decision, we highly recommend getting familiar with the pros and cons of each of them. You can find more information about Enterprise Integration Patterns here.
WSO2 ESB comes with powerful features, some of them not always well understood by its users. One of the features which ensures that critical to high-priority messages are not dropped is the WSO2 ESB capability of prioritizing messages. So we recommend examining the following link in order to master this important topic.
There are a couple of methods which you can use when you want to deploy artifacts to a Carbon server: 1) via Developer Studio IDE, or 2) via Maven-Car-Deploy-Plugin. This blog post from SOA Tutorials provides a clear overview and easy steps to follow what you need to do.
The same resource also provides an excellent overview of general security best practices that you should follow to secure your implementation. For example, in REST services deployments it is recommend to secure your services with OAuth (Bearer and HMAC) and Basic authentication with HTTPS.
In the documentation for WSO2 ESB there is a clear overview of mediators, and also best practices for when you are working with mediators. We recommend reviewing these best practices.
WSO2 ESB and many other WSO2 products provide organizations with the flexibility they need to reach their business goals. To see this in action, you can watch a recording of Belatrix’s webinar which examined how one retail company decided to implement WSO2’s ESB and Data Services Server in order to become a more nimble organization. The webinar highlights the benefits these products provided.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506640.22/warc/CC-MAIN-20210116104719-20210116134719-00585.warc.gz
|
CC-MAIN-2021-04
| 3,004 | 10 |
https://forums.adobe.com/thread/1271936
|
code
|
So, I am new to Dreamweaver and constantly baffled about finding solutions to problems on my own.
My issue is this. I have been assigned the duty of updating and modifying our company's webpage. I had nothing to do with the creation of this page, so I am working with someone else's work.
http://www.csus.edu/isr/index.html this is what I'm working on.
My problem had been editing this template that is used on all the other pages. I have a spry menu bar that has all of our menu options. I found a way to add a bar to that, at my company's request. The other edit I made to the page was adding buttons for facebook and twitter. I have updated the file on a local copy, saved it once seeing it worked well in the preview browser, and then replaced the file on the remote server. The template does not change at all. None of my changes are applied whatsoever.
Any idea why this is happening? I have no clue at this point. I have tried everything I could think of.
Do you think it has anything to do with editable regions, or what??? I have no clue
I would appreciate any response at all. Thank You.
So from what I can tell, one of my issues is that my Spry menu bar needs to be non-editable so that the tamplate changes will be applied globally, how to I make it non=editable???
Templates don't do anything at the server level. They are a local site management tool in Dreamweaver only.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815318.53/warc/CC-MAIN-20180224033332-20180224053332-00405.warc.gz
|
CC-MAIN-2018-09
| 1,385 | 9 |
https://getsatisfaction.com/voddler/topics/is_it_ok_to_empty_the_vn_storage_folder
|
code
|
The vn_storage folder on my computer is 15GB, this is obviously outragious. Are these temp files created while watching things? Is it safe to remove them? Will they increase without limit as I continue to watch films, taking over my hard-drive in the process?
Help get this topic noticed by sharing it on Twitter, Facebook, or email.
EMPLOYEE1It is possible, but not recommended to empty vn_storage as it might effect VoddlerNet.
The size of vn_storage should not continue to increase and 15GB should only be reached while you watch a movie and should shrink after the movie has ended.
vn_storage is used by VoddlerNet - please see: http://www.voddler.com/en/help/topic/... for more information about VoddlerNet and http://www.voddler.com/en/help/topic/... for the technical requirements for VoddlerNet
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206118.10/warc/CC-MAIN-20140423032006-00327-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 802 | 5 |
https://supportforums.cisco.com/discussion/10829381/fwsm-sharing-interface-vlans
|
code
|
I am trying to share two vlans in two different contexts but when I try to add the same vlan in the second context I receive this message: “Interface Vlan15 cannot be allocated to context. Interface is allocated to another context in a different failover group”. I have seen same example where you can share the same vlans; so I don’t know where is my fail.
Move both failover groups to one blade so, they both show active on one blade.
Now, move the context A(previous one) to a diff. failover group. Now, you can add the vlan to context B which will also be in the same failover group.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424945.18/warc/CC-MAIN-20170725002242-20170725022242-00597.warc.gz
|
CC-MAIN-2017-30
| 593 | 3 |
https://www.srfstrategies.com.au/new-blog/2018/8/21/wireless-adaptor-upgrade
|
code
|
Just finished a simple upgrade of a computer's internal wireless adapter with a TP-Link AC1300 PCI Express Adapter.
The existing wireless adapter's drivers could not be updated to run properly on Windows 10, and so was beginning to not pick up all the WiFi SSIDs in its vicinity, and at times would completely drop the signal it was connected to. Time for an upgrade.
The only problem encountered with the install was that the computer wouldn't boot. Even after disabling the internal wireless card the computer still wouldn't start. So one person online suggested putting the new adapter into a different PCIe slot. Why you might ask? Something to do with the configuration of the mother-board, but it worked.
See the video below for a quick overview of the install.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573735.34/warc/CC-MAIN-20190919204548-20190919230548-00483.warc.gz
|
CC-MAIN-2019-39
| 767 | 4 |
https://forum.mendix.com/link/space/databases/questions/90372
|
code
|
How to connect to existing Database like CRM, SQL server?
Hi, We need to use mendix apps to connect to existing database which developed with CRM and SQL server. Can we use existing CRM/SQL DB in Mendix apps? If yes how can we import existing entities and table structure in to the current app.
Yes, you can use the Database Connector in the Mendix Appstore: https://appstore.home.mendix.com/link/app/2888/Mendix/Database-Connector
This connector enables you to run SQL queries on external databases. It will not create entities for you, this is something need to do yourself using a domain model.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.23/warc/CC-MAIN-20231203125921-20231203155921-00822.warc.gz
|
CC-MAIN-2023-50
| 597 | 4 |
https://www.bcb.iastate.edu/gdcb-seminar-special-invite-bcb-faculty-and-students
|
code
|
GDCB Seminar and Luncheon
Director of Life Sciences Computing
Texas Advanced Computing Center
University of Texas
Friday, January 29
GDCB and BCB Graduate Students:
All of those interested:
His seminar will take place at 4:10 p.m. in 1414 Molecular Biology Building.
Title: Arabidopsis Information Portal: A Community-Extensible Platform for Open Data
Abstract: The Araport (https://araport.org) project provides a comprehensive, evidence-based annotation of the Arabidopsis Col-0 reference genome, presented via a modern web portal for searching, browsing, and interacting with Arabidopsis data. Uniquely among all model organism resources, Araport is built from the ground up to be extensible by the research community. This talk will cover the the major Araport components: Thalemine, JBrowse, Science Apps, provide an update on the upcoming Araport11 genome release, and describe how researchers can get started sharing their own data and visualizations at Araport.
Join us for refreshments in the MBB atrium at 3:45 PM before the seminar.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592150.47/warc/CC-MAIN-20180721012433-20180721032433-00136.warc.gz
|
CC-MAIN-2018-30
| 1,043 | 11 |
https://www.zonealarm.com/forums/showthread.php/49192-IM-security-issue?goto=nextnewest
|
code
|
I'm an old time zone alarm user.
the free version user of corse. I cannot afford the super type versions..
but i have a router (D-Link)then ZoneAlarm . and i adventualy notice that some internet connections are not moniterd by ZoneAlarm's " outgoing and incoming " bars.But the internet light flickers off at times. can this represent a hacker?
how can i get rid of this computer info thief if so?
and im curious, GRC i heard is a great company similar to zonealarm's firewall. should i download the " Shields UP! " thing?
why do i feel so vulnerable to computer hackers even with Zone Alarm cranked up to the max settings i can get for free version?
another thing. what if i DO get a hacker? can zone alarm find and then terminate the file so im happy and safe again?
because I have so many things on my computer i tresure. like family history and more.
one last question, ive noticed " Generic Host Process for Win32 Services " flicker a lot on the program moniter'ing thing.
do any of you have that? its a system file and i check and it says it tries and send things over the internet, but i cant use the internet without it, what should I do?
I feel like a helpless person over the internet, and I cant afford the expencive kinds like I said, they're too much for me
[Hackers are the rulers of the internet. and the law doesn't care about them , even if they break it and go into government files..
it's a fact. a sad one. and we all must pay, virtualy , mentally , consequencely , life wise, and sadly. - its the truth. ]
Windows XP Home Edition
Message Edited by PotatoeMan on 04-13-200604:53 PM
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540909.75/warc/CC-MAIN-20161202170900-00482-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 1,601 | 15 |
https://hughmcguire.net/2012/12/19/1158/
|
code
|
PressBooks to Go Open Source
Some news from my professional life … we’re going to release PressBooks (our online ebook/printbook/webbook publishing tool) as an open source WordPress plugin:
PressBooks Going Open Source
PressBooks is going open source. We will be releasing PressBooks as a WordPress plugin (to be used on a stand-alone WordPress install), under the open source GPL license, target release date: end of January, 2013.
See below for more info, and some answers to questions you might have. And please get in touch if you’d like to know more.
What is PressBooks?
PressBooks is a simple online book publishing tool, built on WordPress. We help publishers and authors create ebooks, typeset/print-ready PDFs (to be turned into real books!), and webbooks (which can be public or private). For publishers, we can provide not just book production toolset, but also an online catalog and website (for examples, see: The Rogue Reader and AskMen Books). [more…]
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057347.80/warc/CC-MAIN-20210922102402-20210922132402-00329.warc.gz
|
CC-MAIN-2021-39
| 974 | 7 |
https://pulp.plan.io/issues/7259
|
code
|
The installer sub-team agreed that we will port these tests (meant for molecule and written in ruby inspec) to ansible tasks: https://github.com/pulp/pulp_installer/blob/master/molecule/scenario_resources/tests/test_default.rb
Presumably, there will be a new verification role at the end of the installer.
Upon further investigation:
- The ansible URI and assert modules should probably be used.
- Counting the redirects may not be possible with the ansible URI module.
- This should be run on the webserver node, and querying against it.
- Some tests like checking the services won't make since on the webserver node, since services pulpcore-api wouldn't run on a separate webserver.
- We're going to need to add variables, at least for a complete and thorough check (beyond what the current ruby ones do.) The checking role will need to be aware of how many workers there are for example.
Updated by Anonymous over 3 years ago
- Status changed from POST to MODIFIED
- % Done changed from 0 to 100
Applied in changeset ansible-pulp|011e6940ed66cee36a1915886fc2380d23c58b32.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100550.40/warc/CC-MAIN-20231205073336-20231205103336-00023.warc.gz
|
CC-MAIN-2023-50
| 1,074 | 12 |
http://www.codingforums.com/archive/index.php/t-236459.html
|
code
|
View Full Version : Return an array from a function
08-29-2011, 09:40 PM
I have this code
$Sql = "SELECT * FROM members WHERE user_id = '$ID'";
$Res = mysql_query($Sql);
while ($row = mysql_fetch_array($Res))
foreach ($row as $ide => $val)
$userDetails[$ide] = $val;
on a functions.php page which is an include on my inc.header page (so every page has the functions). If i call that function at the start of a page and try echo $userDetails['username']; it doesnt return anything but if in the function i put that it outputs the username.
What am i doing wrong? Or is this undoable.
08-29-2011, 10:15 PM
How are you calling and storing the results of the function?
08-29-2011, 10:17 PM
I called it by doing getUserDetails($_SESSION['userID']);
Howeer i put it into a class and i got it working that way, all i need to do to get info is $user->userDetails['whatever i want'];
I didnt think of using a class when i made the function :P
08-29-2011, 10:23 PM
The only difference between a class and a function is the addition of a context.
When you call a method, same as a function, you need to assign the results to something. In the case of a class, you have assigned it to a member which can be accessed as a part of the object. In a function, you need to actually assign the results: $userDetails = getUserDetails($_SESSION['userID']);. $userDetails in the scope of the call is not the same as the $userDetails in the scope of the function. They are completely different memory sets, so there is no relation to them whatsoever.
08-29-2011, 10:32 PM
Okay so do you mean i should have called the function like
$user = getUserDetails($_SESSION['userID']);
Then got the values by doing this?
$user = $userDetails['username'];
08-29-2011, 10:42 PM
No, $user would contain the results of getUserDetails. You would access it under $user['username'].
Alternatively, methods can be written to accept a reference to write directly into:
function loaduser($iUserID, &$aInto)
$sQry = 'SELECT * FROM user WHERE userid = ' . $iUserID;
if ($q = mysql_query($sQry))
$aInto = mysql_fetch_assoc($q);
$user = array();
08-29-2011, 10:46 PM
Ahh i see :), thank you. Just curious whats the & do infront of $aInto? Ive never seen that before.
08-30-2011, 12:20 AM
It creates a reference to the calling variable. By default, methods and functions with the exceptions of objects will perform operations on a copy of the variable, not the original. Using a reference forces all changes to occur on the original.
Functions can also return by reference so any time a variable is assigned to a function result and later the same function is called again but produces different results would be reflected in the previous variable assignment as well. There are very very few uses for return by reference techniques.
08-30-2011, 05:17 AM
Ahh okay, thanks :).
Powered by vBulletin® Version 4.2.2 Copyright © 2017 vBulletin Solutions, Inc. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189589.37/warc/CC-MAIN-20170322212949-00372-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,929 | 40 |
https://forum.facepunch.com/t/hiring-a-glua-coder-for-my-server/183998
|
code
|
I have a brand new server with a creative community ran by creative Owners. We have tons of ideas for addons (quite simple ones) but we lack the skills required to make them ourselves. I am interested in hiring a coder for a server to make addons. You will be paid per addon and after the addon creation and you will only be asked to make an Addon if the money is already readily available. If you would want to ask me some questions you may do so. If you’re interested in the job then you can just add me on Steam (http://steamcommunity.com/id/metalgaming/) and we can get everything going. Thanks for reading this!
This section is for releasing things you’ve personally made, not looking for a coder. Before making another thread in Developer Discussion or somewhere else, please refer to Coderhire.com or the Hire A Coder megathread.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320299852.23/warc/CC-MAIN-20220116093137-20220116123137-00714.warc.gz
|
CC-MAIN-2022-05
| 840 | 2 |
https://www.ssw.com.au/rules/do-you-know-to-write-down-the-attendee-names/
|
code
|
Do you know to write down the Attendee Names?
If the presenter has a small audience (say under 20), then it is best to know the attendee names (or at least quite a few of them) so you are able to communicate better with them throughout the day.
The problem is you will forget their names after they introduce themselves.
The fix is to have a piece of paper, (already divided up) so you can write down the names on it in the order that people are sitting.
This ends up being a great reference you can use to address questions directly to participants using their name. This ensures that attendees keep focused as they may directly have questions referencing them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358208.31/warc/CC-MAIN-20211127163427-20211127193427-00537.warc.gz
|
CC-MAIN-2021-49
| 662 | 5 |
https://craft.co/optinose
|
code
|
The OptiNose delivery devices have high dose reproducibility and avoid drug deposition to the lungs. In summary, the technology fulfills the ideal requirements for nasal drug delivery. Clinical trials have shown the devices can provide a faster onset of action, greater effect with a lower dose and reduced side effects.
Market capitalization (31-Oct-2017)
Closing share price (31-Oct-2017)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804125.49/warc/CC-MAIN-20171118002717-20171118022717-00686.warc.gz
|
CC-MAIN-2017-47
| 390 | 3 |
https://alioth-lists.debian.net/pipermail/offlineimap-project/2016-January/013165.html
|
code
|
jameszee13 at gmail.com
Fri Jan 15 11:18:42 GMT 2016
Been using offlineimap for years and love it. Thanks to those that
have spent their time writing this awesome tool.
It seems that in the last day or so something has happened that has
resulted in offlineimap ceasing to function when checking email. After
the 5min configured window (autorefresh = 5), offlineimap will attempt
to sync with the mail server.
*** Processing Account work
INFO:OfflineImap:*** Processing account work
I have to force the process to stop (CTRL + \), and based on the
output it appears that the process is deadlocked. Several of the
threads and the Sync Runner stop at line 340 of the python threading
library, function waiter.acquire().
Unsure where to start troubleshooting this. This was working fine
until about 48hrs ago and haven't changed anything on my system.
Any thoughts appreciated.
More information about the OfflineIMAP-project
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100309.57/warc/CC-MAIN-20231202010506-20231202040506-00067.warc.gz
|
CC-MAIN-2023-50
| 920 | 18 |
https://www.mindandlife.org/grant/meditation-induced-changes-in-anticipation-and-experience-of-pain/
|
code
|
Human neuroimaging offers a powerful way to connect animal and human research on emotion, with profound implications for psychological science. However, the gulf between animal and human studies remains a formidable obstacle: Human studies typically focus on the cortex and a few subcortical regions such as the amygdala, whereas deeper structures such as the brainstem periaqueductal gray (PAG) play a key role in animal models. Here, we directly assessed the role of PAG in human affect by interleaving physical pain and negative image viewing during a single fMRI session. PAG activity increased in both conditions. We next examined eight independent datasets, half investigating pain and half negative image viewing. We found increased activity in the same portion of the PAG in all eight studies. Taken together, these findings suggest PAG is a key component of human affective responses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00108.warc.gz
|
CC-MAIN-2024-10
| 893 | 1 |
http://www.tomshardware.com/forum/246707-28-upgrading-laptop
|
code
|
My pop's laptop has got a Intel Pentium M 740 @ 1.73ghz. CPU-Z says the socket is an 479 mPGA and the process is 90nm.
My laptop's got a Intel Core 2 Duo T5300 @ 1.73ghz. Same socket but a 65 nm process. Sooooo...
Is there any way I can update his CPU to a Core 2 Duo? They've got my CPU at newegg for like 200 bucks.
Also, other info that might not matter. Mine is codename Merom, his is Dothan.
THanks for any help.
Sorry if this is one of those redundant noob questions.
(E6750 or Q6600?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137145.1/warc/CC-MAIN-20140914011217-00267-ip-10-234-18-248.ec2.internal.warc.gz
|
CC-MAIN-2014-41
| 490 | 7 |
https://spuddy.org/Beeb/
|
code
|
Back in 1983 or 1984 I got my first computer; a BBC Model B. This was
a shared Christmas present with my brother. A few years later (1987?)
I traded him my Amstrad stereo system for his half, so it was all mine.
In the mean time I had expanded it with a Solidisk DDFS (1770 based)
and a Solidisk SWR card; I tried a couple of variants before settling
on the 2Meg128 card. This had 4 additional ROM slots and 128K of
RAM. I'd also had an EPROM programmer and eraser and had built and
burnt a few EPROMs. I'd written my own manager ROM (based off the STL
code) and added the E00 DFS to the back of the EXMON code (both were 8K
ROMs so I could store the E00 DFS in the 2nd half of a 16k ROM and add
a command that'd copy it into a SWRam bank).
When I moved to America I took the Beeb, one floppy drive and my floppies
with me, but left my manuals, EPROM programmer etc etc behind. I'd never
need 'em again! It took many years before I could actually use the Beeb
properly, but I finally got hold of a composite-video to VGA converter that
would work on PAL standards.
Recently I found a thriving community of Beeb fans. One person has
created a board that allows you to have ramdisk, USB, MMC and so on. On
a Beeb! Another person has created a simpler MMC adapter. I got a varient
of that. And so I found myself coding for the Beeb again.
TOOLS and REVIEW
- Solidisk 2M128 Manager ROM
I wrote/hacked/stole code to be a (IMHO) fairly decent Manager ROM
for the Solidisk 2M128 board. More recently I further hacked it to
work with other boards... but with reduced functionality
- MMB Utilities
A set of Perl utilities that can manipulate MMB files (as used in
the MMC variants)
- Beeb program to image disks
Once I got a MMC card card, the next step was to get data off my floppies. MMB files basically contain
a bundle of SSD files. SSDs are 200K floppy images; 80 track single
sided single density. Most of my floppes are double sided double density;
320K per side. Obviously won't fit! Also Solidisk uses extended catalogues
to store more than 31 files per side. Further complication! This code allows
me to get images of the larger disks onto a PC so I can then work with the
files and build smaller SSDs from the results.
- TubeHost code for Unix
This is a Unix TubeHost filesystem written in perl based around JGH's
HostFS concept. It's basically a serial port filesystem for the Beeb!
- UPURSFS ROM
This is what happens when you take the
TubeHost concept and
combine it with a UPURS cable.
Summary: connect the BBC User port to a PC serial port and then run
a filesystem over it!
- Steve Picton SWR/Flash board
As part of the data recovery, I was given a second Beeb (for free!).
Naturally I couldn't leave well alone, so I added a modern day SWR board to it
- Growing Collection
Slowly my collection grows!
- And I re-arrange them
Make them a little easier to access
- Adding a second (and third) user port
My attempts to build an expansion board that can add a 2nd user port
to the Beeb.
- BASIC extension ROM
Back in the day I wrote (or hacked up) a ROM that would extend BBC BASIC
and add new commands and functions.
- Michael Brown's "30th Anniversary BBC and Electron Collection"
I've built an index of all the discs Michael has uploaded, in order to make
it easier to find and download them.
So much fun from a 30 year old computer!
Last modified: Thursday, 26-Aug-2021 21:40:54 EDT
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00327.warc.gz
|
CC-MAIN-2023-23
| 3,391 | 63 |
https://anhonestdayortwo.wordpress.com/2013/06/30/trifextra-74-inspired-by-henry-jameslivie-in-truth/
|
code
|
This weekend we are asking you to play around with the following quote:
Three things in human life are important. The first is to be kind. The second is to be kind. And the third is to be kind.
We want you to follow the same general structure of the above quote. Feel free to change the subject–tell us what’s important about coffee or houseplants or whatever you’d like. Or else change up the modifier–instead of telling us what’s important, tell us what’s sexy or overrated or pernicious. Your last three lines should closely echo James’s, giving us the same answer three times.
Here is my answer:
First, untrue actions that betray the heart is no way to Live .
Second, lies betray, through truth we truly Live.
Third, obvious truth,we only have one chance to Live.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591296.46/warc/CC-MAIN-20180719203515-20180719223515-00480.warc.gz
|
CC-MAIN-2018-30
| 781 | 7 |
https://www.ultimate-guitar.com/lessons/for_beginners/tuning_the_guitar_for_beginners.html
|
code
|
Hey guys, I am continuing a series of lessons that is for the COMPLETE beginner. It is harder teaching this than expected just because lots of educators assume that people can just figure these things out. Well, I truly hope to help anyone learning. Thanks and enjoy!
Standard tuning: EADGBe
- Sit with proper posture
- If the string is FLAT, then you need to TIGHTEN the string and turn it COUNTER-CLOCKWISE
- If the string is SHARP, then you need to LOOSEN the string and turn in CLOCKWISE
- Turn the tuners slowly
- Be Patient!
Link to a free online tuner here.
About the Author:
By George Salas. Please visit my website and YouTube for more! Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424645.77/warc/CC-MAIN-20170724002355-20170724022355-00592.warc.gz
|
CC-MAIN-2017-30
| 653 | 10 |
https://administratosphere.wordpress.com/2008/06/13/getting-a-network-interface-to-function/
|
code
|
When bringing up a machine, and having to debug network connectivity, there is no substitute for being able to look at network traffic on the wire. Be aware that sniffing traffic can be fatal to your employment and perhaps your career if you do not follow the approved practices in your environment. If you do have the permission to perform network sniffing, it is an invaluable asset for debugging network problems.
One thing to be aware of, especially when not using UNIX or Linux, is that TCP/IP is an add-on protocol for other environments such as Windows and OpenVMS.
What can you determine from sniffing the network traffic?
- Is the system sending out traffic at all?
- What is the actual MAC address of the interface?
- Are ARP requests going out?
- Is DHCP being used? Is it failing or succeeding?
- Is DNS being used? Is it failing or succeeding?
- Is ping working? Are replies being received?
There are many other things that can be answered through looking at the network traffic. At its most basic (if network connectivity is the problem), the server can be disconnected and traffic looked at from the switch (with the normal cable) and from the server (using a cross-over cable).
With this information, it may be possible to clear up many netowrk connectivity problems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00715.warc.gz
|
CC-MAIN-2023-14
| 1,283 | 11 |
https://craftbettersoftware.com/p/you-cant-add-quality-after-the-fact
|
code
|
You can't add quality after the fact
Code reviews, testing later and refactoring later are one of the biggest disasters of the software industry
As Harold F. Dodge - one of the most important figures in the introduction of quality control - once said:
You can not inspect quality into a product.
It would be slightly overkill to say that it exactly applies to software products, but we are not far from the truth. Many software teams don't realize the real cost of not building in quality during the fact. Not starting with good quality will always cost much more in the end. Yet teams are trying to add quality after the fact. They try to inspect the quality into their product. With little to no success. We can’t just start out with quickly produced junk and then fix it later. It will just lead to poor practices that are just duct-taping the code instead of adding real quality. There are many so-called “best practices“ in the space that are widely accepted and became the de-facto way to improve the quality of software in the 21st century. These practices are deeply rotten in our processes. A sad reality. But there is hope.
Pull request (PR) reviews are superficial
PR reviews are one of these duct-taping practices. I don’t say code reviews are bad per se. They work well when untrusted authors try to collaborate together while working in isolation (f.e.: in open-source software development). They also work great when the team members live in different time zones. Of course, it can be still a valid question to ask why those teams have been assembled in that way. But when the authors are known to each other and form a team in a common virtual or physical environment, then using PR code reviews is a recipe for disaster in terms of code quality and lead time. Apart from the issues that PR reviews introduce productivity-killer context switches and result in inefficient communication patterns, the main problem with them is that they happen when it is already too late.
Most of the time the reviewers don't have enough knowledge to do it properly. We have the most recent domain knowledge of the code when we write it. In a PR review, the domain context is neither recent anymore, nor complete. In order to do a proper code review, the reviewer would need to understand the whole context behind the code, study all the requirements in deep detail, take part in the design sessions, and be aware of the domain knowledge and the conclusions that are gained during customer collaboration. We have to be honest, a reviewer never has all this knowledge while doing a review. The less we know, the less efficient code reviews are, which will lead to a higher risk of mistakes. One critical mistake can close the door of a company in modern web development. Since these “review requirements“ are not fulfilled by the reviewers - as they would take a significant time for them - the PR code reviews will end up being superficial. No inspection can find all the flaws. Additionally, as the number of lines to be reviewed increases, the quality of the review decreases.
The code reviews out there usually discuss code styling, some renamings here and there, and smaller refactorings. It is rare to see reviews where the overall code structure is deeply analyzed. They also miss discussions about the possible corner, edge, and missing test cases.
By the way, if you use mutation testing to find gaping holes in test suites during a code review, then you are my guest for a beer.
Not to mention the security concerns of the given application. If we don’t know the context deeply, then we can’t come up with great improvement points for the solution. If we don’t know the domain details, we don’t know how to abstract it. As always, the domain drives the design. Without it, one can only come up with improvement points that just scratch the surface of our application.
Testing later is not sufficient
You can not test your way to quality. Testing later tells nothing about how simple your code is. It won’t tell you if your code is readable or easy to improve. Tests will not show if you have unnecessary complexity in your code. Testing later is not only inappropriate but also inefficient. Testing later won’t guarantee that your code will be testable. Furthermore, it is impossible to trust our code where the tests are written afterward. Because we never see them failing. We never see them red. If we want to trust our code, we need to be able to trust our tests. If we want to trust our tests we need to be able to see them failing. If we never see our tests fail we don’t know if our tests are actually testing the right things. Seeing a test failing is as important as seeing it passing. A test failure validates that the test is meaningful and unique.
Just imagine now writing tests after the fact, you've probably already done this. How can you be assured that your tests are actually testing the right thing? How can you be sure that they don’t produce false negatives? False negatives are tests that do not fail (but they should) in a presence of a bug. They are invalid always passing tests, providing no value. For example a test with no or incorrect assertions. When we don’t start with a failing test, we need to take additional steps to be sure that our tests are testing the right thing. It leads to cumbersome workflows.
Furthermore, how can you be sure that you cover all your business logic with tests? If the answer is code coverage, then I have bad news for you. Code coverage is not a quality metric. You can have 100% test coverage without any meaningful tests. Just imagine you have a code having 100% code coverage. Cool. Now imagine deleting all your test assertions from your tests. Now run your code coverage tool again. The result? 100% code coverage. Do you still trust your tests? It is a hell of a misleading metric. Code coverage can help to detect untested areas of the code, but does not tell anything about the tested areas. One potential solution for this could be to use mutation testing. It could help you to find the missing tests in your test suite. But mutation testing is far from perfect, it is demotivating to use and requires additional effort. Again, using such a tool feels like duct-taping the code, instead of adding real quality to the product.
Refactoring later never happens
“We will refactor it later”. “We will clean it up later”. These are the biggest lies in our industry. Refactoring later never happens. Yet teams claim that they can add quality after the fact with refactoring. Even if it happens, it will include a lot of risks and will be very expensive. Likewise, the domain knowledge will be highly degraded after the fact, resulting in weak refactoring actions. We won’t be able to refactor the code as efficiently as we would have done while we were writing the code. How are we going to abstract some logic into a dedicated module half a year after the code is written? We will forget all the domain knowledge till then, making proper abstraction nearly impossible.
"Refactoring" is a word that should not be in any plan for making software. It is not something that you plan to do, but instead, it is something that you should always do. It's like washing your hands in the bathroom, you always do it when you need to, not only when it is planned. Refactoring should happen continuously, all the time, without asking any permission for it.
All of these practices (PR reviews, refactoring later, testing later) just build a false sense of security. They are flawed, inefficient, superficial, and lack a shared understanding of domain knowledge. On top of that, all the frustrations, waste and demotivation they bring to the team. We should not rely on these to improve quality. They are only duct-taping our software.
The process is deeply rotten. If the process is bad, the process needs to be improved. So when to add quality then? Quality should be built in from day one. Quality has to be built in, not tackled on afterward. Teams should start out with a high-quality system, then incrementally grow it with quality practices. Because once you have garbage in your system, it is very difficult to get rid of it. The only way to ensure quality is to build it during the development process. The only way to build quality during the development process is to keep refactoring, testing, and reviewing the software along the way. We need to do these every step of the way.
If we want to produce quality software, it has to be created with quality practices, in real-time, with quality-minded people. If you want to build quality during the fact, then use Test-Driven Development, Trunk Based Development, and other Extreme Programming practices such as Pair, and Mob Programming, with continuous collaboration with your end user. By doing TDD you will ensure that you will keep testing and refactoring your code, all the time. You will have all the necessary domain knowledge to do that, with trustworthy test suites you can rely on. Pair/Mob programming will make sure that your code is continuously reviewed, real-time with people having the right domain knowledge of the code to reason it about. These techniques will make PR reviews redundant, refactoring a daily habit, and tests are a core part of our design flow.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816875.61/warc/CC-MAIN-20240414064633-20240414094633-00334.warc.gz
|
CC-MAIN-2024-18
| 9,336 | 21 |
https://openi.nlm.nih.gov/detailedresult.php?img=PMC3473355_gr2&req=4
|
code
|
Congruence and indifference between two molecular markers for understanding oral evolution in the Marynidae sensu lato (Ciliophora, Colpodea).
Bottom Line: Our understanding of the evolution of oral structures within the Colpodida is confounded by the low number of morphological characters that can be used in constructing hypotheses, and by the low taxon and character sampling in molecular phylogenetic analyses designed to assess these hypotheses.We show that the inferred mitochondrial and nuclear SSU-rDNA trees, as well as concatenated and constrained analyses, are congruent in not recovering a monophyletic Marynidae.However, due to low node support, the trees are indifferent to whether the morphological characters used to unite the Marynidae are the result of retention of ancestral states or convergence.
Affiliation: Department of Ecology, University of Kaiserslautern, Germany. [email protected] MeSH
Related in: MedlinePlus
Mentions: To evaluate the possibility of low taxon sampling affecting the inferred tree, taxon inclusion for nSSU-rDNA was limited to match the alignment for mtSSU-rDNA. This nuclear alignment of 1676 included characters resulted in identical ML and Bayesian topologies for moderately to highly supported nodes (Fig. 2). For non-Marynidae sequences, the nSSU-rDNA topology is congruent with previously published trees (Bourland et al. 2011; Dunthorn et al. 2008, 2009, 2011; Foissner et al. 2011; Quintela-Alonso et al. 2011) for moderately to highly supported nodes. Thus, the limited taxon inclusion does not appear to have an effect. As in the mtSSU-rDNA tree, the Marynidae s.l. are not monophyletic. Ilsiella branches sister to all Colpodida, except Bardeliella. The two Maryna sequences, which are sister to each other with full node support (100/100), form a clade with Hausmanniella and Colpoda aspera, although the node for this larger clade is not supported (<50/71). As the intervening nodes between Maryna and Ilsiella are not moderately to fully supported, the nSSU-rDNA tree provides little confidence in the non-monophyly of the Marynidae.
Affiliation: Department of Ecology, University of Kaiserslautern, Germany. [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825916.52/warc/CC-MAIN-20181214140721-20181214162221-00617.warc.gz
|
CC-MAIN-2018-51
| 2,204 | 6 |
https://shammash.livejournal.com/6155.html
|
code
|
I caught a fly a few days ago. The stupid thing was inside the house. It was flying around, so of course I had to bring it down. I let it crawl around for a while. We played with it, and then eris_raven ate it.
She was a chicken in her last life, so I suppose that explains it. Flies. Ugh.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521876.48/warc/CC-MAIN-20200404103932-20200404133932-00153.warc.gz
|
CC-MAIN-2020-16
| 289 | 2 |
http://www.webassist.com/forums/post.php?pid=159881
|
code
|
Getting date error on CachedResize_Image.php - "Warning: date(): It is not safe"
Hi, getting the following error on image resizer, anyone any thoughts please?
Warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected 'Europe/London' for 'BST/1.0/DST' instead in /var/www/vhosts/mydomain.com/httpdocs/webassist/caching/CachedResize_Image.php on line 283
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247526282.78/warc/CC-MAIN-20190222200334-20190222222334-00397.warc.gz
|
CC-MAIN-2019-09
| 608 | 3 |
http://realtechtalk.com/Linux_cant_bootgrub_boot_loader_screen_with_no_options_solution-2356-articles
|
code
|
Usually if you get the grub boot loader and it doesn't show any boot options, it's because grub was not installed correctly and/or the partition that it is supposed to be on has changed or does not exist. It can also happen if you install Linux to one drive, but the boot loader to another by accident, whether EFI or MBR/Legacy mode.
You can normally fix your booting/bootloader/MBR/EFI it by chrooting into your root partition:
#make a directory called target where we will mount your root partition
#mount /dev/sda3 to target (change to match your root partition)
#eg if your root is /dev/sda2 then change it below
mount /dev/sda3 /target
#if you are using EFI mount your EFI partition to /target/boot/efi (assume here it is /dev/sda1)
mount /dev/sda1 /target/boot/efi
#we need to mount dev proc and sys for the chroot to work like it was booted normally so we can fix it
for mount in dev proc sys; do
mount -o bind /$mount /target/$mount
#run grub install on the drive that you installed Linux to
Then in your EFI BIOS it will show as "realtechtalk.com". You can change to what's suitable for you, otherwise it's the OS default (eg. Mint and Ubuntu will present the name Ubuntu).
For the bootloader-id to work you need to do a normal grub-install first which creates the OS defaut, at least in Ubuntu based. For Debian based you need to specify --bootloader-id debian and then do secondary grub-install with your desired bootloaderid.
If you are using EFI and you are fixing things because the wrong drive or partition received the GRUB bootloader, you'll need to update /etc/fstab to fix the mount for /boot/efi.
#fix your /boot/efi mount
/dev/sda1: UUID="21F4-BED9" TYPE="vfat" PARTUUID="ffaee6e2-01"
In our example above the UUID is
Edit /etc/fstab by updating the UUID to the correct value for /boot/efi
With the update
Be sure to save the file and then type "mount -a" to make sure everything can mount OK and that there are no errors in fstab.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818081.81/warc/CC-MAIN-20240422051258-20240422081258-00570.warc.gz
|
CC-MAIN-2024-18
| 1,953 | 21 |
https://azure.microsoft.com/en-us/blog/azure-previews-powerful-and-scalable-virtual-machine-series-to-accelerate-generative-ai/
|
code
|
3 min read
Delivering on the promise of advanced AI for our customers requires supercomputing infrastructure, services, and expertise to address the exponentially increasing size and complexity of the latest models. At Microsoft, we are meeting this challenge by applying a decade of experience in supercomputing and supporting the largest AI training workloads to create AI infrastructure capable of massive performance at scale. The Microsoft Azure cloud, and specifically our graphics processing unit (GPU) accelerated virtual machines (VMs), provide the foundation for many generative AI advancements from both Microsoft and our customers.
“Co-designing supercomputers with Azure has been crucial for scaling our demanding AI training needs, making our research and alignment work on systems like ChatGPT possible.”—Greg Brockman, President and Co-Founder of OpenAI.
Azure’s most powerful and massively scalable AI virtual machine series
Today, Microsoft is introducing the ND H100 v5 VM which enables on-demand in sizes ranging from eight to thousands of NVIDIA H100 GPUs interconnected by NVIDIA Quantum-2 InfiniBand networking. Customers will see significantly faster performance for AI models over our last generation ND A100 v4 VMs with innovative technologies like:
- 8x NVIDIA H100 Tensor Core GPUs interconnected via next gen NVSwitch and NVLink 4.0
- 400 Gb/s NVIDIA Quantum-2 CX7 InfiniBand per GPU with 3.2Tb/s per VM in a non-blocking fat-tree network
- NVSwitch and NVLink 4.0 with 3.6TB/s bisectional bandwidth between 8 local GPUs within each VM
- 4th Gen Intel Xeon Scalable processors
- PCIE Gen5 host to GPU interconnect with 64GB/s bandwidth per GPU
- 16 Channels of 4800MHz DDR5 DIMMs
Delivering exascale AI supercomputers to the cloud
Generative AI applications are rapidly evolving and adding unique value across nearly every industry. From reinventing search with a new AI-powered Microsoft Bing and Edge to AI-powered assistance in Microsoft Dynamics 365, AI is rapidly becoming a pervasive component of software and how we interact with it, and our AI Infrastructure will be there to pave the way. With our experience of delivering multiple-ExaOP supercomputers to Azure customers around the world, customers can trust that they can achieve true supercomputer performance with our infrastructure. For Microsoft and organizations like Inflection, NVIDIA, and OpenAI that have committed to large-scale deployments, this offering will enable a new class of large-scale AI models.
“Our focus on conversational AI requires us to develop and train some of the most complex large language models. Azure’s AI infrastructure provides us with the necessary performance to efficiently process these models reliably at a huge scale. We are thrilled about the new VMs on Azure and the increased performance they will bring to our AI development efforts.”—Mustafa Suleyman, CEO, Inflection.
AI at scale is built into Azure’s DNA. Our initial investments in large language model research, like Turing, and engineering milestones such as building the first AI supercomputer in the cloud prepared us for the moment when generative artificial intelligence became possible. Azure services like Azure Machine Learning make our AI supercomputer accessible to customers for model training and Azure OpenAI Service enables customers to tap into the power of large-scale generative AI models. Scale has always been our north star to optimize Azure for AI. We’re now bringing supercomputing capabilities to startups and companies of all sizes, without requiring the capital for massive physical hardware or software investments.
“NVIDIA and Microsoft Azure have collaborated through multiple generations of products to bring leading AI innovations to enterprises around the world. The NDv5 H100 virtual machines will help power a new era of generative AI applications and services.”—Ian Buck, Vice President of hyperscale and high-performance computing at NVIDIA.
Today we are announcing that ND H100 v5 is available for preview and will become a standard offering in the Azure portfolio, allowing anyone to unlock the potential of AI at Scale in the cloud. Sign up to request access to the new VMs..
Learn more about AI at Microsoft
- Reinventing search with a new AI-powered Microsoft Bing and Edge, your copilot for the web.
- Introducing GitHub Copilot: your AI pair programmer.
- Introducing Microsoft Dynamics 365 Copilot, bringing next-generation AI to every line of business.
- Azure OpenAI Service
- Azure Machine Learning Service
- Microsoft AI at Scale
- NVIDIA Teams With Microsoft to Build Massive Cloud AI Computer
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00072.warc.gz
|
CC-MAIN-2024-18
| 4,658 | 25 |
https://tekmap.ns.ca/blog/sonarwave4
|
code
|
When a file opens in SonarWave Lite, a summary of the XTF header information appears in the File Information window on the top left.
The XTF file information includes:
- Name — the path and file name of the open file.
- Pings — number of samples alongtrack.
- Samples — total number of samples acrosstrack.
- Max Range — maximum distance in metres from nadir.
- Start and Stop Time — start and stop times for the open file.
- Coordinates — West, East, South, and North bounds extracted from the navigation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00857.warc.gz
|
CC-MAIN-2023-50
| 518 | 8 |
https://www.safaribooksonline.com/library/view/commercial-photoshop-retouching/059600849X/ch02s03.html
|
code
|
Figure 2-27. Before: a picture of a lonely tree
Normally, I would start a project like this by making a mask of the object. Masks will be covered in a later chapter, so for now, we'll assume that the tree has been cropped out.
Figure 2-28. After: tree in its new environment with proper shadow
Creating a shadow for a complex object is a little more involved than the freehand shading we've done so far. In this section, we'll create a shadow for a more intricate object, the complex tree shown in Figure 2-27. By the time we get to the final image, Figure 2-28, we'll have replanted this tree on a hillside with the proper shadow intact.
First, make a selection of the tree and create a new multiplied shadow layer. On the new multiplied layer, fill the selection with a 98% black, as I've done in Figure 2-29.
Figure 2-29. The tree selected and filled with 98% black
Next, select Edit → Transform Path → Skew. Move the transform center pivot point of the transform tool to the bottom of the tree, so that it will be the pivot point of the shadow, as in Figure 2-30. Then, adjust the corner handles and distort the shadow layer until the desired shadow angle is achieved. ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215404.70/warc/CC-MAIN-20180819224020-20180820004020-00651.warc.gz
|
CC-MAIN-2018-34
| 1,180 | 7 |
https://www.gunco.net/threads/x-and-y-axis.1212/
|
code
|
The "X" & "Y" axis refers to the trigger and hammer pin holes. The reason for this is an original manufacturer uses a die to form a "X" and "Y" at each LH hole. The "X" is for the hammer pin and the "Y" is for ther trigger pin. I've heard it's supposed to strenghten the hole. Found a picture of what I'm talking about.
Hope this helps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00608.warc.gz
|
CC-MAIN-2023-14
| 336 | 2 |
http://savios.blogspot.com/2004/09/savi-target-points.html
|
code
|
Savi Target Points
The timeline includes a clock. When you click and drag the clock it becomes a countdown timer. The more you drag down the longer the time - the further to the right, the greater the sensitivity of the timer setting scale. Releasing starts the timer and produces a bar from the Now terminator on the timeline, into the future. As Now passes the end point an alarm sounds and the end point is now dragged by Now to become a count up timer. Clicking the bar causes the clock to show the bar's current value. Later, the bar can be dropped in the database panel to produce a preset timer for later use.
All objects that have values that can be varied have target points on them. Clicking and dragging an object may move the actual object, but clicking and dragging an object's target point pops up magnified scales of values that can be changed. Any movement left or right would switch scales and any movement up or down would scroll through the available values.
Expanding on that -- registered value types within documents could have their own target points; the phrase, "A temperature of 180° Celsius" could be clicked to show a scale centred on that value and its Fahrenheit equivalent.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00161-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,205 | 4 |
http://www.apug.org/forums/viewpost.php?p=525225
|
code
|
My son gave me the book a few months ago as a gift. While always happy to do whatever is necessary to encourage his interest in photography, including accepting photo books, I must say that I was not impressed with many of the images in the book. When I look at a book, frankly I want to learn something about how to make my photos as good as what I'm looking at, either by vision or technique. But many of the photos in this book seem to me to be nothing exceptional. OK, they're a record of her life and at least the title is honest, but where's the craft she's supposed to have? Many of the photos seem ordinary. I'm sure they serve as precious reminders to her of moments in her life, and if I were her they'd mean something to me, but I'm not so many have little value either emotionally or aesthetically.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447758.91/warc/CC-MAIN-20151124205407-00017-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 810 | 1 |
https://www.graphext.com/glossary/approximate-nearest-neighbors-ann
|
code
|
Approximate Nearest Neighbors (ANN) and k-Nearest Neighbors (KNN) are both algorithms used to find similar data points in a dataset, but they differ in terms of accuracy and computational complexity. Yes!
k-Nearest Neighbors (KNN):
- KNN is an exact algorithm that finds the k closest data points to a query point in a dataset.
- It calculates the distance between the query point and all data points in the dataset, then sorts the distances and selects the k smallest distances.
- The algorithm can be computationally expensive, especially for large datasets, as it requires calculating distances to all points in the dataset.
- KNN is more accurate because it finds the exact nearest neighbors, but it may not be suitable for real-time applications or large-scale datasets due to its computational complexity.
Approximate Nearest Neighbors (ANN):
- ANN is an approximate algorithm that aims to find the nearest neighbors faster than KNN by trading off some accuracy.
- The algorithm uses various techniques, such as space partitioning, hashing, and tree-based data structures (e.g., k-d trees, ball trees, or locality-sensitive hashing) to speed up the search process.
- ANN is computationally more efficient than KNN, making it suitable for large-scale datasets and real-time applications.
- The algorithm may not find the exact nearest neighbors, but the trade-off between accuracy and speed is often acceptable for many applications.
In summary, the primary difference between Approximate Nearest Neighbors and k-Nearest Neighbors lies in the trade-off between accuracy and computational complexity. ANN is faster and more scalable but may not be as accurate as KNN, which is slower but finds the exact nearest neighbors. The choice between the two depends on the specific application and the balance between accuracy and efficiency requirements.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817014.15/warc/CC-MAIN-20240415174104-20240415204104-00134.warc.gz
|
CC-MAIN-2024-18
| 1,851 | 12 |
https://libraetd.lib.virginia.edu/public_view/sf268572c
|
code
|
Power of Difference Assessment System; The Shifting Boundary Between Open-Source and Proprietary Software and its Role in the Future of AI
Yager, Connor, School of Engineering and Applied Science, University of Virginia
Ku, Tsai-Hsuan, EN-Engineering and Society, University of Virginia
Ibrahim, Ahmed, EN-Comp Science Dept, University of Virginia
The Sum is a Charlottesville-based non-profit, with the stated goal of helping people learn about their implicit biases and understand how to better communicate with people of other backgrounds. Their Power of Difference Assessment, or PDA, is a tool used to identify these implicit biases and collect data that professionals at The Sum can use to consult the assessment taker. Under the initial PDA system, a lack of automation prevented scaling to a larger user base, restricting the growth of the organization and its ability to collect data. Our team was tasked with enhancing the system with features that would allow it to serve as a tool in institutional studies, with the ability to support thousands of assessment-takers and collect meaningful data for use in research.
The genesis of the open-source software development methodology in the 1990s effectively divided the professional software development world into two distinct groups: those individuals and corporations who support free and open-source software and those who support the traditional proprietary model. Today, these lines have become blurred, as proprietary corporations pledge support for the open-source community while open-source developers demand the acceptance of stricter licensing options. With the advent of human-level artificial intelligence on the horizon, this shifting spectrum of code ownership and profitability has great ethical implications, as the most equitable ownership of a technology primed to change the lives of all people comes into question.
In the development of human-level artificial intelligence, the most destructive potential bug in its design is bias. In the same way that human bias is largely dependent on background, AI bias is based on faulty data. This data is the result of human-created algorithms that fail to accurately account for perspectives outside of those of its creator. The open-source vs. proprietary debate extends into this field, with the open-source community championing collective code-ownership, while proprietary supporters promise more rigorous safety testing and quality assurance. While it is difficult to make predictions about future technologies, evaluating the evolving relationship between open-source and proprietary technologies with respect to bias is an essential step in safety-engineering artificial intelligence.
BS (Bachelor of Science)
SCOT, Open-source vs. Proprietary, Artificial Intelligence, The Sum, Bias in AI
School of Engineering and Applied Sciences
Bachelor of Science in Computer Science
Technical Advisor: Ahmed Ibrahim
STS Advisor: Tsai-Hsuan Ku
Technical Team Members: Peter Felland, Amelia Hampford, Nuzaba Nuzhat, Sam Shankman, David Xue, Carl Zhang, William Zheng
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00484.warc.gz
|
CC-MAIN-2023-14
| 3,083 | 14 |
http://lira.epac.to:8080/doc/cinnamon/cinnamon-js/cinnamon-js-ui-dnd.html
|
code
|
Create an object which controls drag and drop for the given actor.
params, do not automatically start drag and drop on click
dragActorMaxSize is present in
params, the drag actor will be scaled down to be no larger than that size in pixels.
dragActorOpacity is present in
params, the drag actor will will be set to have that opacity during the drag.
Note that when the drag actor is the source actor and the drop succeeds, the actor scale and opacity aren't reset; if the drop target wants to reuse the actor, it's up to the drop target to reset these values.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737225.57/warc/CC-MAIN-20200807202502-20200807232502-00231.warc.gz
|
CC-MAIN-2020-34
| 559 | 7 |
http://gurpartapblog.blogspot.com/2010/06/install-oracle-rac-11gr2-on-vmware-on.html
|
code
|
Index of all the posts of Gurpartap Singh's Blog
Please note this should only be used for educational purposes. Courtsey to masterschema and Corpunk.
The hardware required for this install is:
1. At least Dual Core Processor.
6GB (installs comfortably), 4GB RAM (though its slow but it should
work have patience, stop all other programs while you do this install).
4. 50GB HD.
Software required is:
1. Host Operating System is Win 7 64-bit.
2. Guest OS is CentOS 5.4 x86_64.
3. Oracle Grid Infrastructire 11gR2 linux 64-bit.
4. Oracle Database Software 11gR2 linux 64-bit.
5. VMware workstation 7.0.
I aleady have VMware Workstation and it also it has some better features as compared to VMware Server so, I am installing RAC using this VMware Workstation. These steps should also work fine on VMware server.
I assume you already have Windows 7 64-bit installed on your computer. It can be Win 7 Home, Home Premium, Professional or Ultimate. The steps should work on any version of windows. Here I am installing on Windows 7 Professional.
Download and do a typical install of VMware Workstation 7. Once installed we have to do some virtual network updates.
Open VMware from Start->All Progrms->Vmware->Vmware Workstation
On Vmware window click Edit->Virtual Network Editor and you will have the following screen.
Now we will configure some ip addresses for our machines that we are going to create later.
First of all click on vmnet2 and you will get the following screen.
Now click check box "Connect to a host virtual network adaptor and also click check box "Use local DHCP service to distribute IP addresses to the VM".
Now enter Subnet IP as 10.10.1.0 and subnet mask as 255.255.255.0
Now click on the DHCP settings button and enter the the range you want to have for this.
I have entered:
10.10.1.0 to 10.10.1.154
Do the same step for vmnet3 and vmnet4. Just change the subnet IP to 10.10.2.0 and 10.10.3.0 respectively. Also change the range for vmnet3 and vmnet4 from 10.10.2.0 to 10.10.2.154 and 10.10.3.0 to 10.10.3.154 respictively.
We would use :
192.168.1.xxx as a public ip
10.10.1.x as a private ip and
10.10.2.x as a virtual ip
Other screenshots are given below.
Now we will create a base machine. Then by copying base machine we will create our SAN machine and RAC machines. Master schema calls this base machine as a Base Brick Machine.
The only truth in this Universe is God himself.
Never ever forget him, at least he has given you eyes to see
and remeber Him like a mom who does all the work but thinks about her infant child all the time.
Part 1 - Vmware Setup
Part 2 - Setup Base Brick Machine
Part 3 - SAN Setup
Part 4 - RAC VM Setup
Part 5 - Install Grid Infrastructure
Part 6 - Run asmca and Install RDBMS Software
Part 7 - Create RAC database with DBCA
Part 8 - Add node and instance to existing 11gR2 Cluster db
Part 9 - Delete node and inst from existing 11gR2 cluster db
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947328.78/warc/CC-MAIN-20180424202213-20180424222213-00363.warc.gz
|
CC-MAIN-2018-17
| 2,900 | 44 |
https://salsa.debian.org/freedombox-team/plinth/issues/929
|
code
|
Framework: Separate out the short description and app name from the current full string
Created by: Shilpa-Badekila
Estimate : 2 points Separate out the short description and app name from the current full string
- In the new card based user interface and for other purposes such as figuring out the name of the manual page, it is good to have the generic name such as 'Bittorrent Web Client' from the name of the application such as 'Transmission'. Separate out the two strings as short_description and name for each application.
- For each application create two variables instead of one.
- Update the menu code to compose the menu item name from the two variables.
- Test for each application that menu entry is correct.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670743.44/warc/CC-MAIN-20191121074016-20191121102016-00217.warc.gz
|
CC-MAIN-2019-47
| 723 | 7 |
https://pmd.github.io
|
code
|
C:\pmd-bin-6.52.0\binto PATH, either
pmd.bat -d c:\src -R rulesets/java/quickstart.xml -f text
choco install -y pmd
pmd -d c:\src -R rulesets/java/quickstart.xml -f text
Our license: BSD-style.
Source Code: Check it out on github
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710533.96/warc/CC-MAIN-20221128135348-20221128165348-00090.warc.gz
|
CC-MAIN-2022-49
| 229 | 6 |
https://smidesign.info/news.php?action=show&id=3098
|
code
|
My fear to snakes Essays & Research Papers - EssayTags. Hari' s campaign last year against the Starbucks Pumpkin Spice Latte drove me to launch my site ( don' t fuck with a. Essay on Superstition; being an inquiry into the effects of.
Sykes will use the snake to get rid of her In her canadian custom essays Brookings Essay, " The. DH Lawrence as Snake Charmer - Digital Commons @ IWU - Illinois. Express poem snakes essay of fear analysis Helpline- Get answer of your question fast from real experts. Fear of snakes essay - YouTube.
The Fallacies of Egoism the Fundamental Principle of Morality ( after Kant , Altruism Nelson) I have not done wrong. Are you afraid of heights?
The fear of snakes and spiders is very common in people. For those with limited bandwidth, CLICK HERE.
Natural Organic GMO- Free Fear. As soon as I got his message,.
Forum Poena cullei ( from Latin. 1 pages) Powerful Essays. Snakes essays Snakes essays Some people are drawn to snakes, others are terrified.
A good number of classical even modern poets continue to use the snake to depict the evil nature of man as well as his fear towards the natural environment. Are We Born to be Afraid?
While writing on the symbolism of Ksheera Sagara Manthan, I did not rely. A of on for snakes introduction essay phobia. Snake fear essay.
Why are Jews hated by so many people? Essay snakes fear of about - ICB04. Kids Talk About: Feeling Scared Email us today · Slave Haven Underground Railroad Museum · Contact Us · Childline Rocks Facebook · Childline Rocks Twitter · Home · The Antislavery Movement · A Walk Through History. Help of fear snakes essay - Atlas Applique.
Snake fear essay. Someone saw it come into the yard, but it has not been found.
Do Help essay snakes of fear. Among my worst fears is that my horse will unwittingly step on a small snake on the trail and I' ll be forced to pick a bloody segment of its body out of her hoof. In Giovan snakes essay. Fear of Snakes - Cape Snake Conservation 8 Ekidakika - Leonid Gavrishov tarafından yüklendiClick link: gl/ KBDBuR? Firstly, we have just released a free web demo for Yeah Jam.
Poem snakes essay of fear analysis - Little Sisters of the Poor Mobile Help of fear snakes essay. However for people with severe Ophidiophobia, an image of a snake in books , the mere mention, on TV can lead to an intense fear response the reactions of which can.
Maybe not in the long run – but no explanation no. Are you afraid of the water? Enjoy proficient essay writing and custom writing services provided help of fear snakes essay by professional academic writers·. Help of fear snakes essay - Die Cut Griptape. The boys found a huge snake and chased me. · In his classic war memoir Storm of Steel, Ernst Jünger writes about many things other than combat but all take us into the trenches as he saw them. · Delia' s has a fear of snakes and Sykes intends to get her to. San Francisco in the middle sixties was a very special time and place to be a part of. The fear of snakes fear essay help heights acrophobia of or Ophidiophobia is the second most common phobia in the world. MOTHER Now remember, keep your. Fahrenheit 451 research paper quilling, political art essay paper city of ember essay macbeth comparing the play vs.
- Google Kitaplar Sonucu Fear means being afraid of panic· When people ask me what my greatest fear is I lie. This lecture will guide you toward the draft of your Critical essays tavi tikki rikki theme Evaluation Essay along the way ask you to complete two assignments. However, some people with snake phobias do find that it interferes with. Narayan depicts a family with a problem. The Snake Essay - 1653 Words - brightkite.
My knees recall a watery buckle whenever I remember my encounters with snakes their undulations across my path their many permutations. Snakes bugs rats? Some of this facination comes from the fact that they have no legs, any yet can get around quite easily.
The " Negative Confession" or. In: Craig Beck; fear, Designed to quickly help you reduce , of snakes remove the overpowering fear of. This has lead to the belief that ' the only.
Snake fear essay. Photo essay now up on us as a world power essay * * EXTENDED.
The boys found a huge snake and chased me. · In his classic war memoir Storm of Steel, Ernst Jünger writes about many things other than combat but all take us into the trenches as he saw them. · Delia' s has a fear of snakes and Sykes intends to get her to. San Francisco in the middle sixties was a very special time and place to be a part of.
The fear of snakes fear essay help heights acrophobia of or Ophidiophobia is the second most common phobia in the world. MOTHER Now remember, keep your. Fahrenheit 451 research paper quilling, political art essay paper city of ember essay macbeth comparing the play vs.The title of Hanya Yanagihara’ s second work of fiction stands in almost comical contrast to its length: at 720 pages, it’ s one of the biggest novels to be. Of snakes about fear essay. The Carolina Regular was sixteen; the Volunteer from Ohio had just gone eighteen. Short essay on snakes Essay Help This Is An Essay About Fear Of Snake.
Dec 31 “ The Humbling, · After reading a sex scene in Philip Roth’ s latest novel ” someone I know threw the book into the trash on a subway platform. IMDb: Adapted from the list posted by Chris ( GandiC) on the Nature.
Opponents one Southern one not. Use the snake to. If she does not move Sykes will use the snake to get rid of her In her Brookings Essay, help of fear snakes essay " The Wall " Brookings Senior Fellow Vanda.
As a result of had a phobia about snakes and have had dreams about snakes. In the story " A Snake in the Grass" by R. Essay snakes fear of about Symbolism of the snake english literature essay in giovan francesco straparola' s telling of biancabella the snake the ' snake' has a rather important. · Heather Kirn Lanier is working on a collection of.
It is an anxiety disorder affecting about 19 million people in the United States. Poem snakes essay of fear analysis - Diseño de paginas web. Fear of about essay snakes.
Snake fear essay. Enjoy proficient essay writing and custom writing services provided by professional academic writers· When people. She is bewildered between the sense of awe how these two contradictory feelings co- exist , fear intermingle in a way that. This essay discusses the use of snake imagery. Snake fear essay.
Yesterday' s risks prepare us to fear snakes lizards, spiders although all three combined now kill only a dozen Americans a year. Essay snakes fear of about of snake hunters draws large audiences and boosts ratings.
This i believe essay friendship incarceration rate essay antigone sophocles play analysis essay essay personal life experience forrest gump essay thesis what font size to use for essay. As mentioned below, I have been discussing a possible coffee- table book of Zappa fan memorabilia with Ahmet Zappa.
If she does not move,. Essay a snakes for phobia on introduction of - Fitness Factory “ A Snake in the Grass” by R.
Threepenny: Volz, Snakebit The Ramada Inn at Shiloh. Fear of snakes essay about myself, if i do my homework i' ll get good.
Why are so many people anti- Semitic? Help snakes fear essay of. Adapted from the list posted by Chris ( GandiC) help of fear snakes essay on the Nature. Fear of snakes essay fear of snakes. Learn how to overcome the fear of snakes. Looking for help stories kearney other and.
Snake fear essay. Explainer: why are we afraid of spiders? Poena cullei ( from Latin ' penalty of the sack' ) under Roman law was a type of death penalty imposed on a subject who had been found guilty of parricide Because fear of snakes is widespread footage of snake hunters draws large audiences boosts ratings.
Get close to the detail Experience the journey Take a tour. Snake fear essay. Joseph Campbell who became the most famous scholar of world religions, because of his book The Power of Myth. However despite the common use of snakes in literary works poets often use the snake in various unique ways.
About of snakes fear essay. Fear of failure college essay, woodlands homework help romans.
CLICK HERE for the full video transcript of both How Big Oil Conquered the World Why Big Oil Conquered the World. Or closed spaces? Net features free lesson plans for poem snakes essay of fear analysis elementary. Keeping essay a snakes for phobia on introduction of their distance from another crow they had.
· What the Terrorists Want. Help of fear snakes essay - LifelineCard.
Both hailed from semi- prosperous farms, both possessed tenor voices. Fear Of Snakes - WriteWork. Com Answer to This is an essay about fear of snake.
Metaphor Politics, Morality Why Conservatives Have Left Liberals In the Dust. 826 North Second Street | P. Deconstructing the Essay Snakes Psyche Mode of Writing: Expository Thesis The extreme fear of snakes originated from human evolution , survival instinct rather than personal experience. 1653 words - 7 pages.
I write essays about my father scour childhood memories, peek between my fingers at YouTube videos of snakes scaring myself so badly one night that I run to. How and why did anti- Semitism start? Net/ Garden Web Bluebirding. Snake fear essay ile ilgili görseller Essay and I need the date of. On introduction for snakes a of phobia essay. Snakes essay - wzr. Snake fear essay. Chick flick such a major set- up of the lifestyle that it' s absurd to call it anything essay a snakes.
In the field of psychology cognitive dissonance pay for my esl creative writing is the mental discomfort ( psychological stress) experienced by a person who simultaneously holds two more. Nonetheless throughout the world, cross- culturally , fear, the snake is an object of fascination . The terrorists' goal. The Use of Snake Imagery in the Poems The Double- Headed Snake.Our prehistoric ancestors had the very same fears— which is why you are alive today. Research paper on wireless transmission of electricity referencing articles in an essay charlot soldat descriptive essay oil conservation essay pdf sound pollution. Canterbury shaker village in. · When people ask.
I have no clue why I' m scared of the dark or where my. Is there a solution to anti- Semitism? Enjoy proficient essay writing and custom writing services provided by professional academic writers.
The people who know about it already love it are poem snakes essay of fear analysis frantically. Lots of people have snake phobias, but most don' t feel the need to seek out professional help. Essay on Superstition: Being an Inquiry Into the Effects of. Answer to this is an essay about fear of snake would you please read and give me any suggestion about it fear is an unconscious.
Its bite is deadly. | Psychology Today. Would You Pl | Chegg.
After pictures surfaced showing the boxer posing with a huge yellow python in a nightclub fans accused him of faking his fear- something the handler in the snap has denied. Adapted from the list posted by Chris ( GandiC) on the Nature. Essay analysis poem fear of snakes. Essay fear snakes of about.
For whatever reason, sankes are the subject of countl. Humans have many fears. Fear of Snakes Phobia – Ophidiophobia - Phobia List.
This version of the article was originally published in “ Graphic Forms: essay snakes fear of about In this post we provide useful tips, which are aimed to help you in your descriptive essay writing· Essays from hyde gate park essay. Fear is an unconscious Essay about Fear Of Snakes - 283 Words - StudyMode FEAR OF SNAKES On a particular day, a friend of mine called me on. Essay writing Kenny Pau Hunting Snake Essay Example for Free.
This version of the article was originally published in “ Graphic Forms: Harry Potter and the Prisoner of Azkaban ( ) Trivia on. Cancer’ s effects are wickedly varied but, for Christopher Hitchens losing his voice has been among the cruelest; here he explores the profound link between. The family in the story has a cobra somewhere in their yard. Bressay oil field statoil mastercard?Poena francesca saving essay cullei from latin 39penalty of the sack39 under roman law essay fear of snakes a type of death penalty imposed on a subject who had been help of fear. Get the facts on phobia causes. What are the most common fears that we have? Symptoms of fear of snakes. In his studies of world. Essays - largest database of quality sample essays and research papers on My Fear To Snakes. Our most common fears are of snakes bugs . Poem snakes essay of fear analysis Snake Phobia: Common & Treatable.
Felbab- Brown explains the true costs of help of fear snakes essay building a barrier on the U. It had moved into my storage shed, following the food chain.
Science and the End of Ethics - Google Kitaplar Sonucu. Snake fear essay.
Once in early summer I nearly stumbled upon an adolescent copperhead a foot long as big around as a dime. In the case of snakes some are also venomous, spiders with a few having the potential to kill.
Over 180 Ladders Term Papers, Snakes , Ladders Research Paper, Ladders Essays, Snakes Book Reports. Snake fear essay.
VirtualSalt The Personal Computer as a Tool for Student Literary Analysis Robert Harris Version Date: December 30, 1994. Fear of snakes poem analysis essays.
My Fear To Snakes Free Essays - StudyMode. Fear | Lapham' s Quarterly. Thesis proposal writing ppt It was the year 1983 when I was young I was forced to go to a wedding where snakes passed around. Along with spiders leeches , other ' creepy- crawlies', people often perceive snakes as animals to fear hate.
INTRODUCTION by Edward Waterman. What has worked for you?
Cameos, Mistakes, essay snakes fear of about Spoilers and more. But knowing your enemy is only half the battle.
Presented here in its entirety is Don Herron' s famous essay, essay snakes fear of about. IGLESIA CONFRATERNIDAD CRISTIANA – Fear of snakes essay Of help snakes fear essay.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00618.warc.gz
|
CC-MAIN-2019-04
| 13,972 | 54 |
https://www.mi.fu-berlin.de/en/inf/groups/hcc/research/projects/gfBio/index.html
|
code
|
German Federation for Biological Data
German Research Foundation (DFG) [Fund number: 229241684]
The German Federation for Biological Data (GFBio) is a sustainable, service oriented, national data infrastructure facilitating data sharing for biological and environmental research. The infrastructure supports scientists in all aspects of research data management covering the complete life cycle of data.
The provided services include the creation of Data Management Plans (DMP), provision of tools for data acquisition, data publication in long-term archives as well as platforms for data discovery and sharing.
In this project, we are responsible of the development and maintenance of the Terminology Service (TS), a key component of the GFBio infrastructure. The TS enables a semantically enriched data management and archiving solution for GFBio and constitutes the terminological and ontological basis for data annotation, discovery and curation. It offers universal access to heterogeneous terminological resources, ranging from simple vocabularies to complex ontologies, in a uniform and transparent manner. We provide researchers with a set of tools and services for sharing and reusing terminologies useful for their research. They can enrich their own applications by accessing the public API or directly using the offered widgets to enable semantic annotation and terminology based access capabilities.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591763.20/warc/CC-MAIN-20200118023429-20200118051429-00545.warc.gz
|
CC-MAIN-2020-05
| 1,412 | 5 |
https://franz.com/support/documentation/10.1/ansicl/subsubse/lexicale.htm
|
code
|
ANSI Common Lisp 3 Evaluation and Compilation 3.1 Evaluation 3.1.1 Introduction to Environments
184.108.40.206 Lexical EnvironmentsA lexical environment for evaluation at some position in a program is that part of the environment that contains information having lexical scope within the forms containing that position. A lexical environment contains, among other things, the following:
The lexical environment that is active at any given position in a program being semantically processed is referred to by definite reference as "the current lexical environment," or sometimes as just "the lexical environment."
Within a given namespace, a name is said to be bound in a lexical environment if there is a binding associated with its name in the lexical environment or, if not, there is a binding associated with its name in the global environment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00419.warc.gz
|
CC-MAIN-2024-18
| 847 | 4 |